Improper Input Validation Affecting bind9 package, versions <1:9.8.1.dfsg.P1-4.2
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-BIND9-346470
- published 25 Jul 2012
- disclosed 25 Jul 2012
Introduced: 25 Jul 2012
CVE-2012-3817 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
bind9
to version 1:9.8.1.dfsg.P1-4.2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind9
package and not the bind9
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x before 9.7.6-P2; 9.8.x before 9.8.3-P2; 9.9.x before 9.9.1-P2; and 9.6-ESV before 9.6-ESV-R7-P2, when DNSSEC validation is enabled, does not properly initialize the failing-query cache, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) by sending many queries.
References
- https://security-tracker.debian.org/tracker/CVE-2012-3817
- http://support.apple.com/kb/HT5880
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
- https://kb.isc.org/article/AA-00729
- http://www.debian.org/security/2012/dsa-2517
- http://lists.opensuse.org/opensuse-updates/2012-08/msg00013.html
- http://lists.opensuse.org/opensuse-updates/2012-08/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-1122.html
- http://rhn.redhat.com/errata/RHSA-2012-1123.html
- http://secunia.com/advisories/51096
- http://www.securitytracker.com/id?1027296
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2012-3817
- http://www.ubuntu.com/usn/USN-1518-1