Access Restriction Bypass Affecting bind package, versions [,9.6-ESV-R10-P1)[9.8.61, 9.8.6-P1)[9.9.41, 9.9.4-P1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
1.28% (86th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-BIND-2382008
  • published26 Jan 2022
  • disclosed8 Nov 2013
  • creditUnknown

Introduced: 8 Nov 2013

CVE-2013-6230  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade bind to version 9.6-ESV-R10-P1, 9.8.6-P1, 9.9.4-P1 or higher.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass. The Winsock WSAIoctl API in Microsoft Windows Server 2008, as used in ISC BIND 9.6-ESV before 9.6-ESV-R10-P1, 9.8 before 9.8.6-P1, 9.9 before 9.9.4-P1, 9.9.3-S1, 9.9.4-S1, and other products, does not properly support the SIO_GET_INTERFACE_LIST command for netmask 255.255.255.255, which allows remote attackers to bypass intended IP address restrictions by leveraging misinterpretation of this netmask as a 0.0.0.0 netmask.

References

CVSS Scores

version 3.1