CVE-2013-2266
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
28/03/2013
Last modified:
11/04/2025
Description
libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
Impact
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://linux.oracle.com/errata/ELSA-2014-1244
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html
- http://marc.info/?l=bugtraq&m=136804614120794&w=2
- http://marc.info/?l=bugtraq&m=136804614120794&w=2
- http://rhn.redhat.com/errata/RHSA-2013-0689.html
- http://rhn.redhat.com/errata/RHSA-2013-0690.html
- http://support.apple.com/kb/HT5880
- http://www.debian.org/security/2013/dsa-2656
- http://www.isc.org/software/bind/advisories/cve-2013-2266
- http://www.securityfocus.com/bid/58736
- http://www.ubuntu.com/usn/USN-1783-1
- https://kb.isc.org/article/AA-00871/
- https://kb.isc.org/article/AA-00879/
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579
- http://linux.oracle.com/errata/ELSA-2014-1244
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html
- http://marc.info/?l=bugtraq&m=136804614120794&w=2
- http://marc.info/?l=bugtraq&m=136804614120794&w=2
- http://rhn.redhat.com/errata/RHSA-2013-0689.html
- http://rhn.redhat.com/errata/RHSA-2013-0690.html
- http://support.apple.com/kb/HT5880
- http://www.debian.org/security/2013/dsa-2656
- http://www.isc.org/software/bind/advisories/cve-2013-2266
- http://www.securityfocus.com/bid/58736
- http://www.ubuntu.com/usn/USN-1783-1
- https://kb.isc.org/article/AA-00871/
- https://kb.isc.org/article/AA-00879/
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579