ID

VAR-201301-0132


CVE

CVE-2012-5689


TITLE

ISC BIND Service disruption in ( Violation of representation and named Terminate daemon ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-001275

DESCRIPTION

ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record. ISC BIND is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. The following are affected: ISC BIND 9.8.0 through versions 9.8.4-P1 ISC BIND 9.9.0 through versions 9.9.2-P1. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: ISC BIND AAAA Record Lookup Handling Assertion Failure Vulnerability SECUNIA ADVISORY ID: SA51969 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51969/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51969 RELEASE DATE: 2013-01-25 DISCUSS ADVISORY: http://secunia.com/advisories/51969/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51969/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51969 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in ISC BIND, which can be exploited by malicious people to cause a DoS (Denial of Service). This can be exploited to trigger an assertion failure and terminate the named process. Successful exploitation requires that both DNS64 and Response Policy Zones are configured and that A rewrite rules are maintained but not AAAA rewrite rules. The vulnerability is reported in versions 9.8.0 through 9.8.4-P1 and 9.9.0 through 9.9.2-P1. SOLUTION: As a workaround ensure that the RPZ contains a AAAA rewrite rule for every A rewrite rule. The vulnerability will be fixed in a beta version scheduled to be released on January 24, 2013. PROVIDED AND/OR DISCOVERED BY: The vendor credits Pories Ediansyah, Institut Teknologi Bandung. ORIGINAL ADVISORY: http://www.isc.org/software/bind/advisories/cve-2012-5689 https://kb.isc.org/article/AA-00855 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201401-34 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: BIND: Denial of Service Date: January 29, 2014 Bugs: #437828, #446094, #453974, #463497, #478316, #483208, #498016 ID: 201401-34 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in BIND, possibly resulting in Denial of Service. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-dns/bind < 9.9.4_p2 >= 9.9.4_p2 Description =========== Multiple vulnerabilities have been discovered in BIND. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker may be able to cause a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All BIND users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/bind-9.9.4_p2" References ========== [ 1 ] CVE-2012-5166 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5166 [ 2 ] CVE-2012-5688 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5688 [ 3 ] CVE-2012-5689 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5689 [ 4 ] CVE-2013-2266 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2266 [ 5 ] CVE-2013-3919 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3919 [ 6 ] CVE-2013-4854 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4854 [ 7 ] CVE-2014-0591 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0591 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201401-34.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . ============================================================================ Ubuntu Security Notice USN-2693-1 July 28, 2015 bind9 vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.04 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: Bind could be made to crash if it received specially crafted network traffic. Software Description: - bind9: Internet Domain Name Server Details: Jonathan Foote discovered that Bind incorrectly handled certain TKEY queries. (CVE-2015-5477) Pories Ediansyah discovered that Bind incorrectly handled certain configurations involving DNS64. This issue only affected Ubuntu 12.04 LTS. (CVE-2012-5689) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.04: bind9 1:9.9.5.dfsg-9ubuntu0.2 Ubuntu 14.04 LTS: bind9 1:9.9.5.dfsg-3ubuntu0.4 Ubuntu 12.04 LTS: bind9 1:9.8.1.dfsg.P1-4ubuntu0.12 In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: bind security and enhancement update Advisory ID: RHSA-2013:0550-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0550.html Issue date: 2013-02-21 CVE Names: CVE-2012-5689 ===================================================================== 1. Summary: Updated bind packages that fix one security issue and add one enhancement are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. DNS64 is used to automatically generate DNS records so IPv6 based clients can access IPv4 systems through a NAT64 server. A flaw was found in the DNS64 implementation in BIND when using Response Policy Zones (RPZ). If a remote attacker sent a specially-crafted query to a named server that is using RPZ rewrite rules, named could exit unexpectedly with an assertion failure. Note that DNS64 support is not enabled by default. (CVE-2012-5689) This update also adds the following enhancement: * Previously, it was impossible to configure the the maximum number of responses sent per second to one client. This allowed remote attackers to conduct traffic amplification attacks using DNS queries with spoofed source IP addresses. With this update, it is possible to use the new "rate-limit" configuration option in named.conf and configure the maximum number of queries which the server responds to. Refer to the BIND documentation for more details about the "rate-limit" option. (BZ#906312) All bind users are advised to upgrade to these updated packages, which contain patches to correct this issue and add this enhancement. After installing the update, the BIND daemon (named) will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 903417 - CVE-2012-5689 bind: denial of service when processing queries and with both DNS64 and RPZ enabled 906312 - bind: Backport Response Rate Limiting (DNS RRL) patch into Red Hat Enterprise Linux 6 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/bind-9.8.2-0.17.rc1.el6.3.src.rpm i386: bind-debuginfo-9.8.2-0.17.rc1.el6.3.i686.rpm bind-libs-9.8.2-0.17.rc1.el6.3.i686.rpm bind-utils-9.8.2-0.17.rc1.el6.3.i686.rpm x86_64: bind-debuginfo-9.8.2-0.17.rc1.el6.3.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-libs-9.8.2-0.17.rc1.el6.3.i686.rpm bind-libs-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-utils-9.8.2-0.17.rc1.el6.3.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/bind-9.8.2-0.17.rc1.el6.3.src.rpm i386: bind-9.8.2-0.17.rc1.el6.3.i686.rpm bind-chroot-9.8.2-0.17.rc1.el6.3.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.i686.rpm bind-devel-9.8.2-0.17.rc1.el6.3.i686.rpm bind-sdb-9.8.2-0.17.rc1.el6.3.i686.rpm x86_64: bind-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-chroot-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-devel-9.8.2-0.17.rc1.el6.3.i686.rpm bind-devel-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-sdb-9.8.2-0.17.rc1.el6.3.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/bind-9.8.2-0.17.rc1.el6.3.src.rpm x86_64: bind-debuginfo-9.8.2-0.17.rc1.el6.3.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-libs-9.8.2-0.17.rc1.el6.3.i686.rpm bind-libs-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-utils-9.8.2-0.17.rc1.el6.3.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/bind-9.8.2-0.17.rc1.el6.3.src.rpm x86_64: bind-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-chroot-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-devel-9.8.2-0.17.rc1.el6.3.i686.rpm bind-devel-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-sdb-9.8.2-0.17.rc1.el6.3.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/bind-9.8.2-0.17.rc1.el6.3.src.rpm i386: bind-9.8.2-0.17.rc1.el6.3.i686.rpm bind-chroot-9.8.2-0.17.rc1.el6.3.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.i686.rpm bind-libs-9.8.2-0.17.rc1.el6.3.i686.rpm bind-utils-9.8.2-0.17.rc1.el6.3.i686.rpm ppc64: bind-9.8.2-0.17.rc1.el6.3.ppc64.rpm bind-chroot-9.8.2-0.17.rc1.el6.3.ppc64.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.ppc.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.ppc64.rpm bind-libs-9.8.2-0.17.rc1.el6.3.ppc.rpm bind-libs-9.8.2-0.17.rc1.el6.3.ppc64.rpm bind-utils-9.8.2-0.17.rc1.el6.3.ppc64.rpm s390x: bind-9.8.2-0.17.rc1.el6.3.s390x.rpm bind-chroot-9.8.2-0.17.rc1.el6.3.s390x.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.s390.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.s390x.rpm bind-libs-9.8.2-0.17.rc1.el6.3.s390.rpm bind-libs-9.8.2-0.17.rc1.el6.3.s390x.rpm bind-utils-9.8.2-0.17.rc1.el6.3.s390x.rpm x86_64: bind-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-chroot-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-libs-9.8.2-0.17.rc1.el6.3.i686.rpm bind-libs-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-utils-9.8.2-0.17.rc1.el6.3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/bind-9.8.2-0.17.rc1.el6.3.src.rpm i386: bind-debuginfo-9.8.2-0.17.rc1.el6.3.i686.rpm bind-devel-9.8.2-0.17.rc1.el6.3.i686.rpm bind-sdb-9.8.2-0.17.rc1.el6.3.i686.rpm ppc64: bind-debuginfo-9.8.2-0.17.rc1.el6.3.ppc.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.ppc64.rpm bind-devel-9.8.2-0.17.rc1.el6.3.ppc.rpm bind-devel-9.8.2-0.17.rc1.el6.3.ppc64.rpm bind-sdb-9.8.2-0.17.rc1.el6.3.ppc64.rpm s390x: bind-debuginfo-9.8.2-0.17.rc1.el6.3.s390.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.s390x.rpm bind-devel-9.8.2-0.17.rc1.el6.3.s390.rpm bind-devel-9.8.2-0.17.rc1.el6.3.s390x.rpm bind-sdb-9.8.2-0.17.rc1.el6.3.s390x.rpm x86_64: bind-debuginfo-9.8.2-0.17.rc1.el6.3.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-devel-9.8.2-0.17.rc1.el6.3.i686.rpm bind-devel-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-sdb-9.8.2-0.17.rc1.el6.3.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/bind-9.8.2-0.17.rc1.el6.3.src.rpm i386: bind-9.8.2-0.17.rc1.el6.3.i686.rpm bind-chroot-9.8.2-0.17.rc1.el6.3.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.i686.rpm bind-libs-9.8.2-0.17.rc1.el6.3.i686.rpm bind-utils-9.8.2-0.17.rc1.el6.3.i686.rpm x86_64: bind-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-chroot-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-libs-9.8.2-0.17.rc1.el6.3.i686.rpm bind-libs-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-utils-9.8.2-0.17.rc1.el6.3.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/bind-9.8.2-0.17.rc1.el6.3.src.rpm i386: bind-debuginfo-9.8.2-0.17.rc1.el6.3.i686.rpm bind-devel-9.8.2-0.17.rc1.el6.3.i686.rpm bind-sdb-9.8.2-0.17.rc1.el6.3.i686.rpm x86_64: bind-debuginfo-9.8.2-0.17.rc1.el6.3.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-devel-9.8.2-0.17.rc1.el6.3.i686.rpm bind-devel-9.8.2-0.17.rc1.el6.3.x86_64.rpm bind-sdb-9.8.2-0.17.rc1.el6.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2012-5689.html https://access.redhat.com/security/updates/classification/#moderate http://www.isc.org/software/bind/advisories/cve-2012-5689 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRJnU0XlSAg2UNWIIRAqmKAJ9aw1xBPz0zvjWoO1dx8iwrf3KvTwCgh+FG AQqiP7kshwm4ZGsABl1I61k= =gqtc -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.25

sources: NVD: CVE-2012-5689 // JVNDB: JVNDB-2013-001275 // BID: 57556 // PACKETSTORM: 119841 // PACKETSTORM: 124979 // PACKETSTORM: 132857 // PACKETSTORM: 120468

AFFECTED PRODUCTS

vendor:canonicalmodel:ubuntu linuxscope:eqversion:15.04

Trust: 1.6

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.6

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.6

vendor:iscmodel:bindscope:eqversion:9.8.4

Trust: 1.3

vendor:iscmodel:bindscope:eqversion:9.9.2

Trust: 1.3

vendor:iscmodel:bindscope:eqversion:9.9.1

Trust: 1.3

vendor:iscmodel:bindscope:eqversion:9.9.0

Trust: 1.3

vendor:iscmodel:bindscope:eqversion:9.8.3

Trust: 1.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.8.2

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.8.1

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.8.0

Trust: 1.0

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:6.4.z

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.4

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.8.x to 9.8.4-p1

Trust: 0.8

vendor:iscmodel:bindscope:eqversion:9.9.x to 9.9.2-p1

Trust: 0.8

vendor:ubuntumodel:linuxscope:eqversion:15.04

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.8

Trust: 0.3

vendor:iscmodel:bind 9.9.2-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.9.1-p4scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.9.1-p3scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.9.1-p2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.9.1-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.4-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.3-p4scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.3-p3scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.3-p2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.3-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.1b1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.1-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.0-p4scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.0-p3scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.0-p2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.0-p1scope: - version: -

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:f5model:big-ip ltm hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltm hf3scope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip ltm hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip ltm hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltm hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltm hf1scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltm hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip ltm hf2scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip gtm hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip gtm hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip gtm hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtm hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtm hf1scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtm hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip gtm hf3scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip gtm hf2scope:eqversion:11.2.0

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:avayamodel:ip office server editionscope:eqversion:8.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.3

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0.2

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0.1

Trust: 0.3

vendor:avayamodel:aura experience portal sp2scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura experience portal sp1scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0

Trust: 0.3

sources: BID: 57556 // JVNDB: JVNDB-2013-001275 // CNNVD: CNNVD-201301-514 // NVD: CVE-2012-5689

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-5689
value: HIGH

Trust: 1.0

NVD: CVE-2012-5689
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201301-514
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2012-5689
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2013-001275 // CNNVD: CNNVD-201301-514 // NVD: CVE-2012-5689

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:CWE-DesignError

Trust: 0.8

sources: JVNDB: JVNDB-2013-001275 // NVD: CVE-2012-5689

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 132857 // PACKETSTORM: 120468 // CNNVD: CNNVD-201301-514

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201301-514

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-001275

PATCH

title:CVE-2012-5689: BIND 9 with DNS64 enabled can unexpectedly terminate when resolving domains in RPZurl:https://kb.isc.org/article/AA-00855/

Trust: 0.8

sources: JVNDB: JVNDB-2013-001275

EXTERNAL IDS

db:NVDid:CVE-2012-5689

Trust: 3.1

db:ISCid:AA-00855

Trust: 2.0

db:SECUNIAid:51969

Trust: 0.9

db:JVNDBid:JVNDB-2013-001275

Trust: 0.8

db:CNNVDid:CNNVD-201301-514

Trust: 0.6

db:BIDid:57556

Trust: 0.3

db:PACKETSTORMid:119841

Trust: 0.1

db:PACKETSTORMid:124979

Trust: 0.1

db:PACKETSTORMid:132857

Trust: 0.1

db:PACKETSTORMid:120468

Trust: 0.1

sources: BID: 57556 // JVNDB: JVNDB-2013-001275 // PACKETSTORM: 119841 // PACKETSTORM: 124979 // PACKETSTORM: 132857 // PACKETSTORM: 120468 // CNNVD: CNNVD-201301-514 // NVD: CVE-2012-5689

REFERENCES

url:https://kb.isc.org/article/aa-00855/

Trust: 1.6

url:http://www.isc.org/software/bind/advisories/cve-2012-5689

Trust: 1.5

url:http://www.ubuntu.com/usn/usn-2693-1

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2013-0550.html

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5689

Trust: 0.8

url:http://jprs.jp/tech/security/2013-01-25-bind98-vuln-dns64-rpz.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-5689

Trust: 0.8

url:http://secunia.com/advisories/51969

Trust: 0.6

url:https://kb.isc.org/article/aa-00855

Trust: 0.4

url:https://downloads.avaya.com/css/p8/documents/100170230

Trust: 0.3

url:http://www.isc.org/products/bind/

Trust: 0.3

url:http://support.f5.com/kb/en-us/solutions/public/14000/600/sol14601.html?ref=rss

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2012-5689

Trust: 0.3

url:http://secunia.com/advisories/51969/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51969

Trust: 0.1

url:http://secunia.com/advisories/51969/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0591

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3919

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-3919

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5688

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5689

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201401-34.xml

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2266

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5688

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2266

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5166

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4854

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5166

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0591

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4854

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/bind9/1:9.9.5.dfsg-9ubuntu0.2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5477

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/bind9/1:9.9.5.dfsg-3ubuntu0.4

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/bind9/1:9.8.1.dfsg.p1-4ubuntu0.12

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2012-5689.html

Trust: 0.1

url:https://access.redhat.com/security/team/key/#package

Trust: 0.1

url:http://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://access.redhat.com/knowledge/articles/11258

Trust: 0.1

sources: BID: 57556 // JVNDB: JVNDB-2013-001275 // PACKETSTORM: 119841 // PACKETSTORM: 124979 // PACKETSTORM: 132857 // PACKETSTORM: 120468 // CNNVD: CNNVD-201301-514 // NVD: CVE-2012-5689

CREDITS

Pories Ediansyah of Institut Teknologi Bandung

Trust: 0.3

sources: BID: 57556

SOURCES

db:BIDid:57556
db:JVNDBid:JVNDB-2013-001275
db:PACKETSTORMid:119841
db:PACKETSTORMid:124979
db:PACKETSTORMid:132857
db:PACKETSTORMid:120468
db:CNNVDid:CNNVD-201301-514
db:NVDid:CVE-2012-5689

LAST UPDATE DATE

2024-08-14T12:23:08.470000+00:00


SOURCES UPDATE DATE

db:BIDid:57556date:2015-08-12T22:23:00
db:JVNDBid:JVNDB-2013-001275date:2013-01-28T00:00:00
db:CNNVDid:CNNVD-201301-514date:2013-01-30T00:00:00
db:NVDid:CVE-2012-5689date:2016-08-19T18:31:01.430

SOURCES RELEASE DATE

db:BIDid:57556date:2013-01-24T00:00:00
db:JVNDBid:JVNDB-2013-001275date:2013-01-28T00:00:00
db:PACKETSTORMid:119841date:2013-01-25T05:11:42
db:PACKETSTORMid:124979date:2014-01-30T01:18:39
db:PACKETSTORMid:132857date:2015-07-29T01:00:31
db:PACKETSTORMid:120468date:2013-02-21T22:46:26
db:CNNVDid:CNNVD-201301-514date:2013-01-29T00:00:00
db:NVDid:CVE-2012-5689date:2013-01-25T12:00:46.087