Vulnerabilidad en query.c en ISC BIND (CVE-2011-4313)
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
29/11/2011
Última modificación:
11/04/2025
Descripción
query.c en ISC BIND v9.0.x hasta v9.6.x, v9.4-ESV hasta v9.4-ESV-R5, v9.6-ESV hasta v9.6-ESV-R5, v9.7.0 hasta v9.7.4, v9.8.0 hasta v9.8.1, y v9.9.0a1 hasta v9.9.0b1, permite a atacantes remotos provocar una denegación de servicio a través de vectores relacionados con peticiones DNS recursivas, errores de registro, y la captura de un registro inválido por el 'resolver'.
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.0.0:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.0.0:rc2:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.0.0:rc3:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.0.0:rc4:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.0.0:rc5:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.0.0:rc6:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.0.1:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.0.1:rc2:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.1.0:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.1.1:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:isc:bind:9.1.1:rc2:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://blogs.oracle.com/sunsecurity/entry/cve_2011_4313_denial_of
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069463.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069970.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069975.html
- http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00029.html
- http://marc.info/?l=bugtraq&m=132310123002302&w=2
- http://marc.info/?l=bugtraq&m=132310123002302&w=2
- http://marc.info/?l=bugtraq&m=133978480208466&w=2
- http://marc.info/?l=bugtraq&m=133978480208466&w=2
- http://marc.info/?l=bugtraq&m=141879471518471&w=2
- http://marc.info/?l=bugtraq&m=141879471518471&w=2
- http://osvdb.org/77159
- http://secunia.com/advisories/46536
- http://secunia.com/advisories/46829
- http://secunia.com/advisories/46887
- http://secunia.com/advisories/46890
- http://secunia.com/advisories/46905
- http://secunia.com/advisories/46906
- http://secunia.com/advisories/46943
- http://secunia.com/advisories/46984
- http://secunia.com/advisories/47043
- http://secunia.com/advisories/47075
- http://secunia.com/advisories/48308
- http://security.freebsd.org/advisories/FreeBSD-SA-11:06.bind.asc
- http://support.apple.com/kb/HT5501
- http://www-01.ibm.com/support/docview.wss?uid=isg1IV11106
- http://www.debian.org/security/2011/dsa-2347
- http://www.ibm.com/support/docview.wss?uid=isg1IV11248
- http://www.isc.org/software/bind/advisories/cve-2011-4313
- http://www.kb.cert.org/vuls/id/606539
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A176
- http://www.redhat.com/support/errata/RHSA-2011-1458.html
- http://www.redhat.com/support/errata/RHSA-2011-1459.html
- http://www.redhat.com/support/errata/RHSA-2011-1496.html
- http://www.securityfocus.com/bid/50690
- http://www.securitytracker.com/id?1026335=
- http://www.ubuntu.com/usn/USN-1264-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71332
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14343
- http://blogs.oracle.com/sunsecurity/entry/cve_2011_4313_denial_of
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069463.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069970.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069975.html
- http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00029.html
- http://marc.info/?l=bugtraq&m=132310123002302&w=2
- http://marc.info/?l=bugtraq&m=132310123002302&w=2
- http://marc.info/?l=bugtraq&m=133978480208466&w=2
- http://marc.info/?l=bugtraq&m=133978480208466&w=2
- http://marc.info/?l=bugtraq&m=141879471518471&w=2
- http://marc.info/?l=bugtraq&m=141879471518471&w=2
- http://osvdb.org/77159
- http://secunia.com/advisories/46536
- http://secunia.com/advisories/46829
- http://secunia.com/advisories/46887
- http://secunia.com/advisories/46890
- http://secunia.com/advisories/46905
- http://secunia.com/advisories/46906
- http://secunia.com/advisories/46943
- http://secunia.com/advisories/46984
- http://secunia.com/advisories/47043
- http://secunia.com/advisories/47075
- http://secunia.com/advisories/48308
- http://security.freebsd.org/advisories/FreeBSD-SA-11:06.bind.asc
- http://support.apple.com/kb/HT5501
- http://www-01.ibm.com/support/docview.wss?uid=isg1IV11106
- http://www.debian.org/security/2011/dsa-2347
- http://www.ibm.com/support/docview.wss?uid=isg1IV11248
- http://www.isc.org/software/bind/advisories/cve-2011-4313
- http://www.kb.cert.org/vuls/id/606539
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A176
- http://www.redhat.com/support/errata/RHSA-2011-1458.html
- http://www.redhat.com/support/errata/RHSA-2011-1459.html
- http://www.redhat.com/support/errata/RHSA-2011-1496.html
- http://www.securityfocus.com/bid/50690
- http://www.securitytracker.com/id?1026335=
- http://www.ubuntu.com/usn/USN-1264-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71332
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14343