Lucene search

K
f5F5F5:K15787
HistoryNov 03, 2014 - 12:00 a.m.

K15787 : BIND vulnerability CVE-2010-0382

2014-11-0300:00:00
my.f5.com
3

7.3 High

AI Score

Confidence

Low

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.04 Low

EPSS

Percentile

91.2%

Security Advisory Description

ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022. (CVE-2010-0382)

Impact

This vulnerability allows unauthorized modification or disruption of service. This issue may affect BIG-IP systems on which BIND has been manually configured to allow recursion and perform Domain Name System Security Extensions (DNSSEC) validation.

7.3 High

AI Score

Confidence

Low

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.04 Low

EPSS

Percentile

91.2%