Lucene search

K
ubuntuUbuntuUSN-2669-1
HistoryJul 07, 2015 - 12:00 a.m.

Bind vulnerability

2015-07-0700:00:00
ubuntu.com
50

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

8.5

Confidence

High

EPSS

0.157

Percentile

96.0%

Releases

  • Ubuntu 15.04
  • Ubuntu 14.10
  • Ubuntu 14.04 ESM
  • Ubuntu 12.04

Packages

  • bind9 - Internet Domain Name Server

Details

Breno Silveira Soares discovered that Bind incorrectly handled certain
zone data when configured to perform DNSSEC validation. A remote attacker
could use this issue with specially crafted zone data to cause Bind to
crash, resulting in a denial of service.

OSVersionArchitecturePackageVersionFilename
Ubuntu15.04noarchbind9< 1:9.9.5.dfsg-9ubuntu0.1UNKNOWN
Ubuntu15.04noarchbind9-doc< 1:9.9.5.dfsg-9ubuntu0.1UNKNOWN
Ubuntu15.04noarchbind9-host< 1:9.9.5.dfsg-9ubuntu0.1UNKNOWN
Ubuntu15.04noarchbind9utils< 1:9.9.5.dfsg-9ubuntu0.1UNKNOWN
Ubuntu15.04noarchdnsutils< 1:9.9.5.dfsg-9ubuntu0.1UNKNOWN
Ubuntu15.04noarchhost< 1:9.9.5.dfsg-9ubuntu0.1UNKNOWN
Ubuntu15.04noarchlibbind-dev< 1:9.9.5.dfsg-9ubuntu0.1UNKNOWN
Ubuntu15.04noarchlibbind-export-dev< 1:9.9.5.dfsg-9ubuntu0.1UNKNOWN
Ubuntu15.04noarchlibbind9-90< 1:9.9.5.dfsg-9ubuntu0.1UNKNOWN
Ubuntu15.04noarchlibdns-export100< 1:9.9.5.dfsg-9ubuntu0.1UNKNOWN
Rows per page:
1-10 of 681

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

8.5

Confidence

High

EPSS

0.157

Percentile

96.0%