Lucene search

K
ubuntuUbuntuUSN-2728-1
HistorySep 02, 2015 - 12:00 a.m.

Bind vulnerability

2015-09-0200:00:00
ubuntu.com
49

8.6 High

AI Score

Confidence

High

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.966 High

EPSS

Percentile

99.6%

Releases

  • Ubuntu 15.04
  • Ubuntu 14.04 ESM
  • Ubuntu 12.04

Packages

  • bind9 - Internet Domain Name Server

Details

Hanno Bรถck discovered that Bind incorrectly handled certain malformed keys
when configured to perform DNSSEC validation. A remote attacker could use
this issue with specially crafted zone data to cause Bind to crash,
resulting in a denial of service.

OSVersionArchitecturePackageVersionFilename
Ubuntu15.04noarchbind9<ย 1:9.9.5.dfsg-9ubuntu0.3UNKNOWN
Ubuntu15.04noarchbind9-doc<ย 1:9.9.5.dfsg-9ubuntu0.3UNKNOWN
Ubuntu15.04noarchbind9-host<ย 1:9.9.5.dfsg-9ubuntu0.3UNKNOWN
Ubuntu15.04noarchbind9utils<ย 1:9.9.5.dfsg-9ubuntu0.3UNKNOWN
Ubuntu15.04noarchdnsutils<ย 1:9.9.5.dfsg-9ubuntu0.3UNKNOWN
Ubuntu15.04noarchhost<ย 1:9.9.5.dfsg-9ubuntu0.3UNKNOWN
Ubuntu15.04noarchlibbind-dev<ย 1:9.9.5.dfsg-9ubuntu0.3UNKNOWN
Ubuntu15.04noarchlibbind-export-dev<ย 1:9.9.5.dfsg-9ubuntu0.3UNKNOWN
Ubuntu15.04noarchlibbind9-90<ย 1:9.9.5.dfsg-9ubuntu0.3UNKNOWN
Ubuntu15.04noarchlibdns-export100<ย 1:9.9.5.dfsg-9ubuntu0.3UNKNOWN
Rows per page:
1-10 of 471

8.6 High

AI Score

Confidence

High

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.966 High

EPSS

Percentile

99.6%