5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
bind is vulnerable to ghost domain names
attack. This is due to a flaw in the way BIND handles the updates of cached name server (NS) resource records. A malicious owner of a DNS domain is able to abuse the vulnerability to keep the domain resolvable by the BIND server even after the delegation has been removed from the parent DNS zone.
marc.info/?l=bugtraq&m=135638082529878&w=2
osvdb.org/78916
rhn.redhat.com/errata/RHSA-2012-0717.html
secunia.com/advisories/47884
www.isc.org/software/bind/advisories/cve-2012-1033
www.isc.org/software/bind/advisories/cve-2012-1667
www.kb.cert.org/vuls/id/542123
www.securityfocus.com/bid/51898
www.securitytracker.com/id?1026647
access.redhat.com/security/updates/classification/#important
exchange.xforce.ibmcloud.com/vulnerabilities/73053
hermes.opensuse.org/messages/15136456
hermes.opensuse.org/messages/15136477
rhn.redhat.com/errata/RHSA-2012-0716.html
www.isc.org/software/bind/advisories/cve-2012-1033