Lucene search

K
ubuntuUbuntuUSN-6421-1
HistoryOct 09, 2023 - 12:00 a.m.

Bind vulnerability

2023-10-0900:00:00
ubuntu.com
33
bind
ubuntu
esm
vulnerability
denial of service
control channel
crash
security

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.9%

Releases

  • Ubuntu 18.04 ESM
  • Ubuntu 16.04 ESM
  • Ubuntu 14.04 ESM

Packages

  • bind9 - Internet Domain Name Server

Details

It was discovered that Bind incorrectly handled certain control channel
messages. A remote attacker with access to the control channel could
possibly use this issue to cause Bind to crash, resulting in a denial of
service.

OSVersionArchitecturePackageVersionFilename
Ubuntu18.04noarchbind9< 1:9.11.3+dfsg-1ubuntu1.19+esm2UNKNOWN
Ubuntu18.04noarchbind9< 1:9.11.3+dfsg-1ubuntu1.19UNKNOWN
Ubuntu18.04noarchbind9-dbgsym< 1:9.11.3+dfsg-1ubuntu1.19UNKNOWN
Ubuntu18.04noarchbind9-doc< 1:9.11.3+dfsg-1ubuntu1.19UNKNOWN
Ubuntu18.04noarchbind9-host< 1:9.11.3+dfsg-1ubuntu1.19UNKNOWN
Ubuntu18.04noarchbind9-host-dbgsym< 1:9.11.3+dfsg-1ubuntu1.19UNKNOWN
Ubuntu18.04noarchbind9utils< 1:9.11.3+dfsg-1ubuntu1.19UNKNOWN
Ubuntu18.04noarchbind9utils-dbgsym< 1:9.11.3+dfsg-1ubuntu1.19UNKNOWN
Ubuntu18.04noarchdnsutils< 1:9.11.3+dfsg-1ubuntu1.19UNKNOWN
Ubuntu18.04noarchdnsutils-dbgsym< 1:9.11.3+dfsg-1ubuntu1.19UNKNOWN
Rows per page:
1-10 of 1061

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.9%