Lucene search

K
ubuntuUbuntuUSN-1783-1
HistoryMar 29, 2013 - 12:00 a.m.

Bind vulnerability

2013-03-2900:00:00
ubuntu.com
35

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

7.6

Confidence

High

EPSS

0.943

Percentile

99.2%

Releases

  • Ubuntu 12.10
  • Ubuntu 12.04
  • Ubuntu 11.10
  • Ubuntu 10.04

Packages

  • bind9 - Internet Domain Name Server

Details

Matthew Horsfall discovered that Bind incorrectly handled regular
expression checking. A remote attacker could use this flaw to cause Bind to
consume an excessive amount of memory, possibly resulting in a denial of
service. This issue was corrected by disabling RDATA regular expression
syntax checking.

OSVersionArchitecturePackageVersionFilename
Ubuntu12.10noarchbind9<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchbind9-host<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchbind9utils<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchdnsutils<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchlibbind-dev<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchlibbind9-80<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchlibdns81<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchlibisc83<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchlibisccc80<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchlibisccfg82<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Rows per page:
1-10 of 481

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

7.6

Confidence

High

EPSS

0.943

Percentile

99.2%