ID

VAR-201303-0312


CVE

CVE-2013-2266


TITLE

UNIX On the platform ISC BIND Service disruption in ( Memory consumption ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-002075

DESCRIPTION

libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process. ISC BIND is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. The following are affected: ISC BIND 9.7.x ISC BIND 9.8.0 through versions 9.8.5-b1 ISC BIND 9.9.0 through versions 9.9.3-b1. For the stable distribution (squeeze), this problem has been fixed in version 1:9.7.3.dfsg-1~squeeze10. For the testing distribution (wheezy), this problem has been fixed in version 1:9.8.4.dfsg.P1-6+nmu1. For the unstable distribution (sid), this problem has been fixed in version 1:9.8.4.dfsg.P1-6+nmu1. We recommend that you upgrade your bind9 packages. Here are the details from the Slackware 14.0 ChangeLog: +--------------------------+ patches/packages/dhcp-4.2.5_P1-i486-1_slack14.0.txz: Upgraded. This update replaces the included BIND 9 code that the DHCP programs link against. Those contained a defect that could possibly lead to excessive memory consumption and a denial of service. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 12.1: ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/dhcp-4.2.5_P1-i486-1_slack12.1.tgz Updated package for Slackware 12.2: ftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/dhcp-4.2.5_P1-i486-1_slack12.2.tgz Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/dhcp-4.2.5_P1-i486-1_slack13.0.txz Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/dhcp-4.2.5_P1-x86_64-1_slack13.0.txz Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/dhcp-4.2.5_P1-i486-1_slack13.1.txz Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/dhcp-4.2.5_P1-x86_64-1_slack13.1.txz Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/dhcp-4.2.5_P1-i486-1_slack13.37.txz Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/dhcp-4.2.5_P1-x86_64-1_slack13.37.txz Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/dhcp-4.2.5_P1-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/dhcp-4.2.5_P1-x86_64-1_slack14.0.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/dhcp-4.2.5_P1-i486-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/dhcp-4.2.5_P1-x86_64-1.txz MD5 signatures: +-------------+ Slackware 12.1 package: c277d6dae778ddf859d3af9584cee23e dhcp-4.2.5_P1-i486-1_slack12.1.tgz Slackware 12.2 package: 15d244081a57135dfa61b8454209d296 dhcp-4.2.5_P1-i486-1_slack12.2.tgz Slackware 13.0 package: df6a3c2e39397f80e03a6b4b112bbf25 dhcp-4.2.5_P1-i486-1_slack13.0.txz Slackware x86_64 13.0 package: dbbdc76cc2bf5054ce15c036f3f4a21f dhcp-4.2.5_P1-x86_64-1_slack13.0.txz Slackware 13.1 package: 77f1881425fbce4922256b9c2d973f80 dhcp-4.2.5_P1-i486-1_slack13.1.txz Slackware x86_64 13.1 package: ce4486703ec878a8cf3cd1e6791e61be dhcp-4.2.5_P1-x86_64-1_slack13.1.txz Slackware 13.37 package: 01a8dde3c944beb5050d0ae6cde11bff dhcp-4.2.5_P1-i486-1_slack13.37.txz Slackware x86_64 13.37 package: 4f74f10dbb95e30b4470cefa66eff96a dhcp-4.2.5_P1-x86_64-1_slack13.37.txz Slackware 14.0 package: aa2d3985c9ea6ebc6882c96383d62e35 dhcp-4.2.5_P1-i486-1_slack14.0.txz Slackware x86_64 14.0 package: 7f75298567f9d6ee252af1389ae9852a dhcp-4.2.5_P1-x86_64-1_slack14.0.txz Slackware -current package: e92641fe8649aa6d122b72e666e7420b n/dhcp-4.2.5_P1-i486-1.txz Slackware x86_64 -current package: 2e46a3038527318b06271e11e763dbb9 n/dhcp-4.2.5_P1-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg dhcp-4.2.5_P1-i486-1_slack14.0.txz Then, restart the dhcp daemon. +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. Release Date: 2013-04-30 Last Updated: 2013-06-14 Potential Security Impact: Remote Denial of Service (DoS) Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX running BIND. This vulnerability could be exploited remotely to create a Denial of Service (DoS). References: CVE-2013-2266 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.31 running BIND 9.7.3 prior to C.9.7.3.2.0 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2013-2266 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided an updated version of the BIND service to resolve this vulnerability. This early release depot will be replaced by the June 2013 Web Upgrade, which is functionally identical. This update is available from the following location https://h20392.www2.hp.c om/portal/swdepot/displayProductInfo.do?productNumber=BIND BIND 9.7.3 for HP-UX Release Depot Name B.11.31 (PA and IA) bind973.depot MANUAL ACTIONS: Yes - Update Download and install the software update PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. AFFECTED VERSIONS For BIND 9.7.3 HP-UX B.11.31 ================== NameService.BIND-AUX NameService.BIND-RUN action: install revision C.9.7.3.2.0 or subsequent END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 30 April 2013 Initial release Version:2 (rev.2) - 14 June 2013 Revised location of update. Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2013 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: bind security and bug fix update Advisory ID: RHSA-2013:0689-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0689.html Issue date: 2013-03-28 CVE Names: CVE-2013-2266 ===================================================================== 1. Summary: Updated bind packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the libdns library. A remote attacker could use this flaw to send a specially-crafted DNS query to named that, when processed, would cause named to use an excessive amount of memory, or possibly crash. (CVE-2013-2266) Note: This update disables the syntax checking of NAPTR (Naming Authority Pointer) resource records. This update also fixes the following bug: * Previously, rebuilding the bind-dyndb-ldap source RPM failed with a "/usr/include/dns/view.h:76:21: error: dns/rrl.h: No such file or directory" error. (BZ#928439) All bind users are advised to upgrade to these updated packages, which contain patches to correct these issues. After installing the update, the BIND daemon (named) will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 928027 - CVE-2013-2266 bind: libdns regular expressions excessive resource consumption DoS 928439 - building bind-dyndb-ldap error: dns/rrl.h: No such file or directory 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/bind-9.8.2-0.17.rc1.el6_4.4.src.rpm i386: bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-libs-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-utils-9.8.2-0.17.rc1.el6_4.4.i686.rpm x86_64: bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-libs-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-libs-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-utils-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/bind-9.8.2-0.17.rc1.el6_4.4.src.rpm i386: bind-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-chroot-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-devel-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-sdb-9.8.2-0.17.rc1.el6_4.4.i686.rpm x86_64: bind-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-chroot-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-devel-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-devel-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-sdb-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/bind-9.8.2-0.17.rc1.el6_4.4.src.rpm x86_64: bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-libs-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-libs-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-utils-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/bind-9.8.2-0.17.rc1.el6_4.4.src.rpm x86_64: bind-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-chroot-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-devel-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-devel-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-sdb-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/bind-9.8.2-0.17.rc1.el6_4.4.src.rpm i386: bind-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-chroot-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-libs-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-utils-9.8.2-0.17.rc1.el6_4.4.i686.rpm ppc64: bind-9.8.2-0.17.rc1.el6_4.4.ppc64.rpm bind-chroot-9.8.2-0.17.rc1.el6_4.4.ppc64.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.ppc.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.ppc64.rpm bind-libs-9.8.2-0.17.rc1.el6_4.4.ppc.rpm bind-libs-9.8.2-0.17.rc1.el6_4.4.ppc64.rpm bind-utils-9.8.2-0.17.rc1.el6_4.4.ppc64.rpm s390x: bind-9.8.2-0.17.rc1.el6_4.4.s390x.rpm bind-chroot-9.8.2-0.17.rc1.el6_4.4.s390x.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.s390.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.s390x.rpm bind-libs-9.8.2-0.17.rc1.el6_4.4.s390.rpm bind-libs-9.8.2-0.17.rc1.el6_4.4.s390x.rpm bind-utils-9.8.2-0.17.rc1.el6_4.4.s390x.rpm x86_64: bind-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-chroot-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-libs-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-libs-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-utils-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/bind-9.8.2-0.17.rc1.el6_4.4.src.rpm i386: bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-devel-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-sdb-9.8.2-0.17.rc1.el6_4.4.i686.rpm ppc64: bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.ppc.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.ppc64.rpm bind-devel-9.8.2-0.17.rc1.el6_4.4.ppc.rpm bind-devel-9.8.2-0.17.rc1.el6_4.4.ppc64.rpm bind-sdb-9.8.2-0.17.rc1.el6_4.4.ppc64.rpm s390x: bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.s390.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.s390x.rpm bind-devel-9.8.2-0.17.rc1.el6_4.4.s390.rpm bind-devel-9.8.2-0.17.rc1.el6_4.4.s390x.rpm bind-sdb-9.8.2-0.17.rc1.el6_4.4.s390x.rpm x86_64: bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-devel-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-devel-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-sdb-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/bind-9.8.2-0.17.rc1.el6_4.4.src.rpm i386: bind-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-chroot-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-libs-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-utils-9.8.2-0.17.rc1.el6_4.4.i686.rpm x86_64: bind-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-chroot-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-libs-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-libs-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-utils-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/bind-9.8.2-0.17.rc1.el6_4.4.src.rpm i386: bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-devel-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-sdb-9.8.2-0.17.rc1.el6_4.4.i686.rpm x86_64: bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-debuginfo-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-devel-9.8.2-0.17.rc1.el6_4.4.i686.rpm bind-devel-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm bind-sdb-9.8.2-0.17.rc1.el6_4.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-2266.html https://access.redhat.com/security/updates/classification/#important http://www.isc.org/software/bind/advisories/cve-2013-2266 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRVMLdXlSAg2UNWIIRAsZfAKCyin6VjKh+MJwZjqJ0tn2+ayZTygCdEwWJ SMtY22xlYL6dxJ9RgKwa9Q0= =/8r6 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266 _______________________________________________________________________ Updated Packages: Mandriva Enterprise Server 5: f36857a433daea597c4ec28038905d17 mes5/i586/bind-9.7.6-0.0.P4.0.2mdvmes5.2.i586.rpm 46c527cc9b22e9177e6fedf60c65925a mes5/i586/bind-devel-9.7.6-0.0.P4.0.2mdvmes5.2.i586.rpm a0bbe5405898b2a2ce7f513788a6a229 mes5/i586/bind-doc-9.7.6-0.0.P4.0.2mdvmes5.2.i586.rpm b321cb2a467724660df48cf92b3945f0 mes5/i586/bind-utils-9.7.6-0.0.P4.0.2mdvmes5.2.i586.rpm 890d003d00da0bfaf671313e85f46d1e mes5/SRPMS/bind-9.7.6-0.0.P4.0.2mdvmes5.2.src.rpm Mandriva Enterprise Server 5/X86_64: 08de2e6cfa579e00e253c37bea966307 mes5/x86_64/bind-9.7.6-0.0.P4.0.2mdvmes5.2.x86_64.rpm ae6189e64132f148a639360d66368fcb mes5/x86_64/bind-devel-9.7.6-0.0.P4.0.2mdvmes5.2.x86_64.rpm 4ee72b2b8917de78790060bb73018af9 mes5/x86_64/bind-doc-9.7.6-0.0.P4.0.2mdvmes5.2.x86_64.rpm c1dd1ebdd63f4cc9fbb83ca0b8a435e0 mes5/x86_64/bind-utils-9.7.6-0.0.P4.0.2mdvmes5.2.x86_64.rpm 890d003d00da0bfaf671313e85f46d1e mes5/SRPMS/bind-9.7.6-0.0.P4.0.2mdvmes5.2.src.rpm Mandriva Business Server 1/X86_64: 71ea4fee0536640c4f391b8ee8b39658 mbs1/x86_64/bind-9.9.2.P2-1.mbs1.x86_64.rpm 181b8e5ddaccb10365b4c03457f7c77b mbs1/x86_64/bind-devel-9.9.2.P2-1.mbs1.x86_64.rpm a7b06470573069c1a0ad207fa5ea401e mbs1/x86_64/bind-doc-9.9.2.P2-1.mbs1.noarch.rpm 88d2444424375c4ca05a860dfdc4e695 mbs1/x86_64/bind-sdb-9.9.2.P2-1.mbs1.x86_64.rpm fd09642c9a8350f4f633e58f33d39a12 mbs1/x86_64/bind-utils-9.9.2.P2-1.mbs1.x86_64.rpm 3c703696946399024c7b107e1d28e031 mbs1/SRPMS/bind-9.9.2.P2-1.mbs1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you

Trust: 2.52

sources: NVD: CVE-2013-2266 // JVNDB: JVNDB-2013-002075 // BID: 58736 // VULMON: CVE-2013-2266 // PACKETSTORM: 121028 // PACKETSTORM: 120973 // PACKETSTORM: 122120 // PACKETSTORM: 121004 // PACKETSTORM: 121132 // PACKETSTORM: 121002

AFFECTED PRODUCTS

vendor:iscmodel:bindscope:eqversion:9.8.4

Trust: 1.9

vendor:iscmodel:bindscope:eqversion:9.7.0

Trust: 1.6

vendor:iscmodel:bindscope:eqversion:9.8.5

Trust: 1.6

vendor:iscmodel:bindscope:eqversion:9.8.1

Trust: 1.6

vendor:iscmodel:bindscope:eqversion:9.8.0

Trust: 1.6

vendor:iscmodel:bindscope:eqversion:9.7.4

Trust: 1.3

vendor:iscmodel:bindscope:eqversion:9.7.2

Trust: 1.3

vendor:iscmodel:bindscope:eqversion:9.9.2

Trust: 1.3

vendor:iscmodel:bindscope:eqversion:9.9.1

Trust: 1.3

vendor:iscmodel:bindscope:eqversion:9.9.0

Trust: 1.3

vendor:iscmodel:bindscope:eqversion:9.8.3

Trust: 1.3

vendor:iscmodel:bindscope:eqversion:9.7.6

Trust: 1.3

vendor:iscmodel:bindscope:eqversion:9.7.3

Trust: 1.3

vendor:iscmodel:bindscope:eqversion:9.7.1

Trust: 1.3

vendor:iscmodel:bindscope:eqversion:9.8.2

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.7.5

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.9.3

Trust: 1.0

vendor:iscmodel:bindscope:ltversion:9.9.3

Trust: 0.8

vendor:iscmodel:bindscope:ltversion:9.9.x

Trust: 0.8

vendor:iscmodel:bindscope:eqversion:9.9.3b2

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.8 to v10.8.4

Trust: 0.8

vendor:iscmodel:bindscope:eqversion:9.8.4-p2

Trust: 0.8

vendor:iscmodel:bindscope:eqversion:9.8.5b2

Trust: 0.8

vendor:iscmodel:bindscope:eqversion:9.7.x

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.7.5

Trust: 0.8

vendor:iscmodel:bindscope:eqversion:9.9.2-p2

Trust: 0.8

vendor:iscmodel:bindscope:ltversion:9.8.5

Trust: 0.8

vendor:iscmodel:bindscope:ltversion:9.8.x

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.7.5

Trust: 0.8

vendor:iscmodel:bind p1scope:eqversion:9.7.1

Trust: 0.6

vendor:iscmodel:bind p2scope:eqversion:9.7.0

Trust: 0.6

vendor:ubuntumodel:linux i386scope:eqversion:12.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:12.10

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.10

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:14.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:14.0

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.37

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.37

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.1

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.2

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.1

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:mcafeemodel:firewall enterprisescope:eqversion:8.3.1

Trust: 0.3

vendor:mcafeemodel:firewall enterprise 8.2.1p04scope: - version: -

Trust: 0.3

vendor:mcafeemodel:firewall enterprise 8.2.1p03scope: - version: -

Trust: 0.3

vendor:mcafeemodel:firewall enterprisescope:eqversion:8.2.1

Trust: 0.3

vendor:mcafeemodel:firewall enterprisescope:eqversion:7.0.1.03

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1x8664

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.8

Trust: 0.3

vendor:iscmodel:bind 9.9.3-b1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.9.2-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.9.1-p4scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.9.1-p3scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.9.1-p2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.9.1-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.5-b1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.4-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.3-p4scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.3-p3scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.3-p2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.3-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.1b1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.1-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.0-p4scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.0-p3scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.0-p2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.8.0-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.7.7

Trust: 0.3

vendor:iscmodel:bind 9.7.6-p4scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.7.6-p3scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.7.6-p2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.7.6-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.7.4b1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.7.4-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.7.3-p3scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.7.3-p2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.7.3-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.7.2-p3scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.7.2-p2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.7.2-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.7.1-p2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.7.0-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.7

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1-relengscope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1-release-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1-rc2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1--relengscope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:9.1

Trust: 0.3

vendor:freebsdmodel:9.0-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.0-relengscope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.0-release-p6scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.0-releasescope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.0-rc3scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.0-rc1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.0--relengscope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:9.0

Trust: 0.3

vendor:freebsdmodel:8.4-beta1scope: - version: -

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:3.1

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:3.0

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.2.00

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.2.00

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.2.00

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.0.00

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.0.0

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.3

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.5

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.3

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.3

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.2

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2.1

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.1.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8

Trust: 0.3

vendor:iscmodel:bind 9.9.2-p2scope:neversion: -

Trust: 0.3

vendor:iscmodel:bind 9.8.4-p2scope:neversion: -

Trust: 0.3

vendor:f5model:enterprise managerscope:neversion:3.1.1

Trust: 0.3

vendor:f5model:enterprise managerscope:neversion:2.3

Trust: 0.3

vendor:f5model:enterprise managerscope:neversion:2.0

Trust: 0.3

vendor:f5model:enterprise managerscope:neversion:1.8

Trust: 0.3

vendor:f5model:enterprise managerscope:neversion:1.6

Trust: 0.3

vendor:f5model:big-ip womscope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip womscope:neversion:10.0

Trust: 0.3

vendor:f5model:big-ip wom hf4scope:neversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip wom hf5scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip wom hf5scope:neversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip wom hf7scope:neversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:neversion:9.4.80

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf4scope:neversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf5scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf5scope:neversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf7scope:neversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip psmscope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip psmscope:neversion:10.0

Trust: 0.3

vendor:f5model:big-ip psmscope:neversion:9.4.8

Trust: 0.3

vendor:f5model:big-ip psmscope:neversion:9.4.5

Trust: 0.3

vendor:f5model:big-ip psm hf4scope:neversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip psm hf5scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip psm hf5scope:neversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip psm hf7scope:neversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip pem hf4scope:neversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip ltmscope:neversion:10.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:neversion:9.6.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:neversion:9.4.8

Trust: 0.3

vendor:f5model:big-ip ltmscope:neversion:9.0

Trust: 0.3

vendor:f5model:big-ip ltm hf4scope:neversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip ltm hf5scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltm hf5scope:neversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip ltm hf7scope:neversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:neversion:9.4.80

Trust: 0.3

vendor:f5model:big-ip link controllerscope:neversion:10.0.00

Trust: 0.3

vendor:f5model:big-ip link controllerscope:neversion:9.2.2

Trust: 0.3

vendor:f5model:big-ip link controller hf4scope:neversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip link controller hf5scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip link controller hf5scope:neversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip link controller hf7scope:neversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip link controller hf4scope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip gtmscope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip gtmscope:neversion:10.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:neversion:9.4.8

Trust: 0.3

vendor:f5model:big-ip gtmscope:neversion:9.2.2

Trust: 0.3

vendor:f5model:big-ip gtm hf4scope:neversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip gtm hf5scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtm hf5scope:neversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip gtm hf7scope:neversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip edge gateway hf4scope:neversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip edge gateway hf5scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip edge gateway hf5scope:neversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip edge gateway hf7scope:neversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:neversion:10.1

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:9.4.80

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:10.2.40

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:10.0.00

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:9.2

Trust: 0.3

vendor:f5model:big-ip asm hf4scope:neversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip asm hf5scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip asm hf5scope:neversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip asm hf7scope:neversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip apm hf4scope:neversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip apm hf5scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip apm hf5scope:neversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip apm hf7scope:neversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:10.1

Trust: 0.3

vendor:f5model:big-ip analytics hf4scope:neversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip analytics hf5scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analytics hf5scope:neversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip analytics hf7scope:neversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip afm hf4scope:neversion:11.3.0

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.8.5

Trust: 0.3

sources: BID: 58736 // JVNDB: JVNDB-2013-002075 // CNNVD: CNNVD-201303-559 // NVD: CVE-2013-2266

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-2266
value: HIGH

Trust: 1.0

NVD: CVE-2013-2266
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201303-559
value: HIGH

Trust: 0.6

VULMON: CVE-2013-2266
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-2266
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2013-2266 // JVNDB: JVNDB-2013-002075 // CNNVD: CNNVD-201303-559 // NVD: CVE-2013-2266

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2013-002075 // NVD: CVE-2013-2266

THREAT TYPE

remote

Trust: 1.0

sources: PACKETSTORM: 121028 // PACKETSTORM: 121004 // PACKETSTORM: 121132 // PACKETSTORM: 121002 // CNNVD: CNNVD-201303-559

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201303-559

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002075

PATCH

title:APPLE-SA-2013-09-12-1url:http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html

Trust: 0.8

title:HT5880url:http://support.apple.com/kb/HT5880

Trust: 0.8

title:HT5880url:http://support.apple.com/kb/HT5880?viewlocale=ja_JP

Trust: 0.8

title:DSA-2656url:http://www.debian.org/security/2013/dsa-2656

Trust: 0.8

title:FEDORA-2013-4533url:https://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html

Trust: 0.8

title:FEDORA-2013-4525url:https://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html

Trust: 0.8

title:HPSBUX02876 SSRT101148url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c03750073

Trust: 0.8

title:A Maliciously Crafted Regular Expression Can Cause Memory Exhaustion in namedurl:http://www.isc.org/software/bind/advisories/cve-2013-2266

Trust: 0.8

title:BIND 9.9.2-P2url:https://www.isc.org/software/bind/992-p2

Trust: 0.8

title:BIND 9.8.4-P2url:https://www.isc.org/software/bind/984-p2

Trust: 0.8

title:CVE-2013-2266: FAQ and Supplemental Informationurl:https://kb.isc.org/article/AA-00879/

Trust: 0.8

title:CVE-2013-2266: A Maliciously Crafted Regular Expression Can Cause Memory Exhaustion in namedurl:https://kb.isc.org/article/AA-00871/

Trust: 0.8

title:CVE-2013-2266 [JP]: 不正に細工された正規表現によってnamedがメモリ不足になるurl:https://kb.isc.org/article/AA-00881

Trust: 0.8

title:RHSA-2013:0690url:http://rhn.redhat.com/errata/RHSA-2013-0690.html

Trust: 0.8

title:RHSA-2013:0689url:http://rhn.redhat.com/errata/RHSA-2013-0689.html

Trust: 0.8

title:USN-1783-1url:http://www.ubuntu.com/usn/USN-1783-1

Trust: 0.8

title:Red Hat: Important: bind97 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20130690 - Security Advisory

Trust: 0.1

title:Red Hat: Important: bind security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20130689 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: CVE-2013-2266url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=ce9346ea3ea8bc38b5a8f240aadc63ad

Trust: 0.1

title:Debian Security Advisories: DSA-2656-1 bind9 -- denial of serviceurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=2301cf18a199518ef55a5962b8bf2d8f

Trust: 0.1

title:Ubuntu Security Notice: bind9 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1783-1

Trust: 0.1

title:Debian CVElist Bug Report Logs: bind9: CVE-2012-5689url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=4c4483f2e7e7c504072dc3dc6ef8958d

Trust: 0.1

title:Amazon Linux AMI: ALAS-2013-176url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2013-176

Trust: 0.1

title:Red Hat: CVE-2013-2266url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2013-2266

Trust: 0.1

sources: VULMON: CVE-2013-2266 // JVNDB: JVNDB-2013-002075

EXTERNAL IDS

db:NVDid:CVE-2013-2266

Trust: 3.4

db:ISCid:AA-00871

Trust: 1.7

db:ISCid:AA-00879

Trust: 1.7

db:BIDid:58736

Trust: 1.4

db:JVNDBid:JVNDB-2013-002075

Trust: 0.8

db:SECUNIAid:52782

Trust: 0.6

db:CNNVDid:CNNVD-201303-559

Trust: 0.6

db:VULMONid:CVE-2013-2266

Trust: 0.1

db:PACKETSTORMid:121028

Trust: 0.1

db:PACKETSTORMid:120973

Trust: 0.1

db:PACKETSTORMid:122120

Trust: 0.1

db:PACKETSTORMid:121004

Trust: 0.1

db:PACKETSTORMid:121132

Trust: 0.1

db:PACKETSTORMid:121002

Trust: 0.1

sources: VULMON: CVE-2013-2266 // BID: 58736 // JVNDB: JVNDB-2013-002075 // PACKETSTORM: 121028 // PACKETSTORM: 120973 // PACKETSTORM: 122120 // PACKETSTORM: 121004 // PACKETSTORM: 121132 // PACKETSTORM: 121002 // CNNVD: CNNVD-201303-559 // NVD: CVE-2013-2266

REFERENCES

url:http://www.isc.org/software/bind/advisories/cve-2013-2266

Trust: 1.9

url:https://kb.isc.org/article/aa-00879/

Trust: 1.7

url:https://kb.isc.org/article/aa-00871/

Trust: 1.7

url:http://support.apple.com/kb/ht5880

Trust: 1.4

url:http://rhn.redhat.com/errata/rhsa-2013-0690.html

Trust: 1.2

url:http://rhn.redhat.com/errata/rhsa-2013-0689.html

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-1783-1

Trust: 1.1

url:http://www.debian.org/security/2013/dsa-2656

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=136804614120794&w=2

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2013/sep/msg00002.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2013-april/101603.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2013-april/101500.html

Trust: 1.1

url:http://www.securityfocus.com/bid/58736

Trust: 1.1

url:http://linux.oracle.com/errata/elsa-2014-1244

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a19579

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2266

Trust: 1.0

url:http://www.ipa.go.jp/security/ciadr/vul/20130328-bind.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2013/at130017.txt

Trust: 0.8

url:http://www.nic.ad.jp/ja/topics/2013/20130327-01.html

Trust: 0.8

url:http://jprs.jp/tech/security/2013-03-27-bind9-vuln-regexp.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2266

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2013-2266

Trust: 0.6

url:http://secunia.com/advisories/52782

Trust: 0.6

url:http://www.isc.org/products/bind/

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/100171618

Trust: 0.3

url:msg://bugtraq/201304021804.r32i4b2i046008@freefall.freebsd.org

Trust: 0.3

url:http://h20565.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?javax.portlet.endcachetok=com.vignette.cachetoken&javax.portlet.prp_ba847bafb2a2d782fcbb0710b053ce01=wsrp-navigationalsta

Trust: 0.3

url:https://kc.mcafee.com/corporate/index?page=content&id=kb77902

Trust: 0.3

url:http://support.f5.com/kb/en-us/solutions/public/14000/300/sol14386.html

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2013-2266.html

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://access.redhat.com/security/team/key/#package

Trust: 0.2

url:http://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/knowledge/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2013:0690

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=28730

Trust: 0.1

url:https://usn.ubuntu.com/1783-1/

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2013-2266

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://slackware.com

Trust: 0.1

url:http://osuosl.org)

Trust: 0.1

url:http://slackware.com/gpg-key

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:https://h20392.www2.hp.c

Trust: 0.1

url:https://www.hp.com/go/swa

Trust: 0.1

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

sources: VULMON: CVE-2013-2266 // BID: 58736 // JVNDB: JVNDB-2013-002075 // PACKETSTORM: 121028 // PACKETSTORM: 120973 // PACKETSTORM: 122120 // PACKETSTORM: 121004 // PACKETSTORM: 121132 // PACKETSTORM: 121002 // CNNVD: CNNVD-201303-559 // NVD: CVE-2013-2266

CREDITS

Matthew Horsfall of Dyn, Inc.

Trust: 0.3

sources: BID: 58736

SOURCES

db:VULMONid:CVE-2013-2266
db:BIDid:58736
db:JVNDBid:JVNDB-2013-002075
db:PACKETSTORMid:121028
db:PACKETSTORMid:120973
db:PACKETSTORMid:122120
db:PACKETSTORMid:121004
db:PACKETSTORMid:121132
db:PACKETSTORMid:121002
db:CNNVDid:CNNVD-201303-559
db:NVDid:CVE-2013-2266

LAST UPDATE DATE

2024-09-15T21:16:44.611000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2013-2266date:2018-10-30T00:00:00
db:BIDid:58736date:2015-04-13T21:48:00
db:JVNDBid:JVNDB-2013-002075date:2013-11-25T00:00:00
db:CNNVDid:CNNVD-201303-559date:2013-04-02T00:00:00
db:NVDid:CVE-2013-2266date:2018-10-30T16:27:02.577

SOURCES RELEASE DATE

db:VULMONid:CVE-2013-2266date:2013-03-28T00:00:00
db:BIDid:58736date:2013-03-26T00:00:00
db:JVNDBid:JVNDB-2013-002075date:2013-04-01T00:00:00
db:PACKETSTORMid:121028date:2013-03-31T19:22:00
db:PACKETSTORMid:120973date:2013-03-27T14:16:03
db:PACKETSTORMid:122120date:2013-06-21T23:55:00
db:PACKETSTORMid:121004date:2013-03-29T01:47:48
db:PACKETSTORMid:121132date:2013-04-08T21:11:06
db:PACKETSTORMid:121002date:2013-03-29T01:47:27
db:CNNVDid:CNNVD-201303-559date:2013-03-28T00:00:00
db:NVDid:CVE-2013-2266date:2013-03-28T16:55:01.040