4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
0.014 Low
EPSS
Percentile
86.1%
The ISC BIND nameserver contains a vulnerability that could allow a remote attacker to cause a denial of service.
According to ISC:
Adding certain types of signed negative responses to cache doesn’t clear any matching RRSIG records already in cache. A subsequent lookup of the cached data can cause named to crash (INSIST).
A remote attacker could cause the name server on an affected system to crash. ISC notes that this vulnerability affects recursive nameservers irrespective of whether DNSSEC validation is enabled or disabled.
**Apply an update
Users who obtain BIND from a third-party vendor, such as their operating system vendor, should see the vendor information portion of this document for a partial list of affected vendors. **
This vulnerability is addressed in ISC BIND versions 9.4-ESV-R4, 9.6.2-P3, 9.6-ESV-R3, and 9.7.2-P3. Users of BIND from the original source distribution should upgrade to one of these versions, as appropriate.
See also <https://www.isc.org/software/bind/advisories/cve-2010-3613>
706148
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: December 01, 2010
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Internet Systems Consortium for reporting this vulnerability.
This document was written by Michael Orlando.
CVE IDs: | CVE-2010-3613 |
---|---|
Severity Metric: | 7.65 Date Public: |