Vulnerabilidad en named de ISC BIND (CVE-2011-1910)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-189
Errores numéricos
Fecha de publicación:
31/05/2011
Última modificación:
11/04/2025
Descripción
Error de superación de límite (off-by-one) en named de ISC BIND 9.x anteriores a 9.7.3-P1, 9.8.x anteriores a 9.8.0-P2, 9.4-ESV anteriores a 9.4-ESV-R4-P1, y 9.6-ESV anteriores a 9.6-ESV-R4-P1 permite a servidores remotos DNS provocar una denegación de servicio (fallo de aserción y finalización del demonio) a través de una respuesta negativa que contenga RRSIG RRsets de gran tamaño.
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.0.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.0.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.0.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.0.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.0.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.0.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.0.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.0.1:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.1.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.1.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.1.1:rc2:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061082.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061401.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061405.html
- http://marc.info/?l=bugtraq&m=142180687100892&w=2
- http://marc.info/?l=bugtraq&m=142180687100892&w=2
- http://osvdb.org/72540
- http://secunia.com/advisories/44677
- http://secunia.com/advisories/44719
- http://secunia.com/advisories/44741
- http://secunia.com/advisories/44744
- http://secunia.com/advisories/44758
- http://secunia.com/advisories/44762
- http://secunia.com/advisories/44783
- http://secunia.com/advisories/44929
- http://security.freebsd.org/advisories/FreeBSD-SA-11:02.bind.asc
- http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.685026
- http://support.apple.com/kb/HT5002
- http://www.debian.org/security/2011/dsa-2244
- http://www.kb.cert.org/vuls/id/795694
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A104
- http://www.redhat.com/support/errata/RHSA-2011-0845.html
- http://www.securityfocus.com/bid/48007
- http://www.securitytracker.com/id?1025572=
- https://bugzilla.redhat.com/show_bug.cgi?id=708301
- https://hermes.opensuse.org/messages/8699912
- https://www.isc.org/software/bind/advisories/cve-2011-1910
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061082.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061401.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061405.html
- http://marc.info/?l=bugtraq&m=142180687100892&w=2
- http://marc.info/?l=bugtraq&m=142180687100892&w=2
- http://osvdb.org/72540
- http://secunia.com/advisories/44677
- http://secunia.com/advisories/44719
- http://secunia.com/advisories/44741
- http://secunia.com/advisories/44744
- http://secunia.com/advisories/44758
- http://secunia.com/advisories/44762
- http://secunia.com/advisories/44783
- http://secunia.com/advisories/44929
- http://security.freebsd.org/advisories/FreeBSD-SA-11:02.bind.asc
- http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.685026
- http://support.apple.com/kb/HT5002
- http://www.debian.org/security/2011/dsa-2244
- http://www.kb.cert.org/vuls/id/795694
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A104
- http://www.redhat.com/support/errata/RHSA-2011-0845.html
- http://www.securityfocus.com/bid/48007
- http://www.securitytracker.com/id?1025572=
- https://bugzilla.redhat.com/show_bug.cgi?id=708301
- https://hermes.opensuse.org/messages/8699912
- https://www.isc.org/software/bind/advisories/cve-2011-1910



