CVE-2012-4244 Affecting bind-libs package, versions <32:9.8.2-0.10.rc1.el6_3.3
Threat Intelligence
EPSS
33.06% (98th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS6-BINDLIBS-2062485
- published 26 Jul 2021
- disclosed 12 Sep 2012
Introduced: 12 Sep 2012
CVE-2012-4244 Open this link in a new tabHow to fix?
Upgrade Centos:6
bind-libs
to version 32:9.8.2-0.10.rc1.el6_3.3 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-libs
package and not the bind-libs
package as distributed by Centos
.
See How to fix?
for Centos:6
relevant fixed versions and status.
ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.
References
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
- http://www.securityfocus.com/bid/55522
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
- https://kb.isc.org/article/AA-00778
- http://support.apple.com/kb/HT5880
- https://access.redhat.com/security/cve/CVE-2012-4244
- http://www.debian.org/security/2012/dsa-2547
- http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087697.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087703.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088381.html
- http://marc.info/?l=bugtraq&m=141879471518471&w=2
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:152
- http://rhn.redhat.com/errata/RHSA-2012-1266.html
- http://rhn.redhat.com/errata/RHSA-2012-1267.html
- http://rhn.redhat.com/errata/RHSA-2012-1268.html
- http://rhn.redhat.com/errata/RHSA-2012-1365.html
- https://access.redhat.com/errata/RHSA-2012:1268
- http://secunia.com/advisories/50560
- http://secunia.com/advisories/50579
- http://secunia.com/advisories/50582
- http://secunia.com/advisories/50645
- http://secunia.com/advisories/50673
- http://secunia.com/advisories/51096
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00007.html
- http://www.ubuntu.com/usn/USN-1566-1
- https://security.netapp.com/advisory/ntap-20221209-0008/
CVSS Scores
version 3.1