Improper Input Validation Affecting bind9 package, versions <1:9.8.4.dfsg.P1-1
Threat Intelligence
EPSS
3.49% (92nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-BIND9-346449
- published 6 Dec 2012
- disclosed 6 Dec 2012
How to fix?
Upgrade Debian:unstable
bind9
to version 1:9.8.4.dfsg.P1-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind9
package and not the bind9
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
References
- https://security-tracker.debian.org/tracker/CVE-2012-5688
- http://support.apple.com/kb/HT5880
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
- https://kb.isc.org/article/AA-00828
- http://rhn.redhat.com/errata/RHSA-2012-1549.html
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2012-5688
- http://www.ubuntu.com/usn/USN-1657-1
CVSS Scores
version 3.1