Lucene search

K
ubuntuUbuntuUSN-1783-1
HistoryMar 29, 2013 - 12:00 a.m.

Bind vulnerability

2013-03-2900:00:00
ubuntu.com
27

7.6 High

AI Score

Confidence

High

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.943 High

EPSS

Percentile

99.2%

Releases

  • Ubuntu 12.10
  • Ubuntu 12.04
  • Ubuntu 11.10
  • Ubuntu 10.04

Packages

  • bind9 - Internet Domain Name Server

Details

Matthew Horsfall discovered that Bind incorrectly handled regular
expression checking. A remote attacker could use this flaw to cause Bind to
consume an excessive amount of memory, possibly resulting in a denial of
service. This issue was corrected by disabling RDATA regular expression
syntax checking.

OSVersionArchitecturePackageVersionFilename
Ubuntu12.10noarchbind9<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchbind9-host<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchbind9utils<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchdnsutils<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchlibbind-dev<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchlibbind9-80<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchlibdns81<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchlibisc83<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchlibisccc80<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Ubuntu12.10noarchlibisccfg82<Β 1:9.8.1.dfsg.P1-4.2ubuntu3.2UNKNOWN
Rows per page:
1-10 of 481

7.6 High

AI Score

Confidence

High

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.943 High

EPSS

Percentile

99.2%