Cache Poisoning issue exists in DNS Response Rate Limiting.
Max CVSS
5.9
EPSS Score
0.11%
Published
2019-11-05
Updated
2019-11-08
rdataset.c in ISC BIND 9 Supported Preview Edition 9.9.8-S before 9.9.8-S5, when nxdomain-redirect is enabled, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via crafted flag values in a query.
Max CVSS
5.9
EPSS Score
0.76%
Published
2016-02-04
Updated
2017-09-10
ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol.
Max CVSS
5.9
EPSS Score
93.44%
Published
2016-07-19
Updated
2020-08-25
A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -> 9.8.8-P1, 9.9.0 -> 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.0 -> 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0 -> 9.11.0-P3, 9.11.1b1->9.11.1rc1, 9.9.3-S1 -> 9.9.9-S8.
Max CVSS
5.9
EPSS Score
8.54%
Published
2019-01-16
Updated
2020-10-20
If named is configured to use Response Policy Zones (RPZ) an error processing some rule types can lead to a condition where BIND will endlessly loop while handling a query. Affects BIND 9.9.10, 9.10.5, 9.11.0->9.11.1, 9.9.10-S1, 9.10.5-S1.
Max CVSS
5.9
EPSS Score
11.65%
Published
2019-01-16
Updated
2019-10-09
A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -> 9.11.7, 9.12.0 -> 9.12.4-P1, 9.14.0 -> 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -> 9.11.7-S1.
Max CVSS
5.9
EPSS Score
0.11%
Published
2019-10-09
Updated
2021-07-21
The default access control lists (ACL) in ISC BIND 9.4.0, 9.4.1, and 9.5.0a1 through 9.5.0a5 do not set the allow-recursion and allow-query-cache ACLs, which allows remote attackers to make recursive queries and query the cache.
Max CVSS
5.8
EPSS Score
0.94%
Published
2007-07-24
Updated
2018-10-30
Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.
Max CVSS
5.7
EPSS Score
22.33%
Published
2012-07-25
Updated
2016-11-28
The GeoIP functionality in ISC BIND 9.10.0 through 9.10.1 allows remote attackers to cause a denial of service (assertion failure and named exit) via vectors related to (1) the lack of GeoIP databases for both IPv4 and IPv6, or (2) IPv6 support with certain options.
Max CVSS
5.4
EPSS Score
0.90%
Published
2014-12-11
Updated
2019-07-30
named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
Max CVSS
5.4
EPSS Score
6.95%
Published
2015-02-19
Updated
2018-10-30
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.
Max CVSS
5.3
EPSS Score
1.02%
Published
2019-01-16
Updated
2019-08-30
An error in zone database reference counting can lead to an assertion failure if a server which is running an affected version of BIND attempts several transfers of a slave zone in quick succession. This defect could be deliberately exercised by an attacker who is permitted to cause a vulnerable server to initiate zone transfers (for example: by sending valid NOTIFY messages), causing the named process to exit after failing the assertion test. Affects BIND 9.12.0 and 9.12.1.
Max CVSS
5.3
EPSS Score
0.65%
Published
2019-01-16
Updated
2019-10-03
Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P2, 9.12.0 -> 9.12.3-P2, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465.
Max CVSS
5.3
EPSS Score
0.07%
Published
2019-10-09
Updated
2019-12-16
In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.
Max CVSS
5.3
EPSS Score
0.34%
Published
2021-10-27
Updated
2022-12-08
BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.
Max CVSS
5.3
EPSS Score
0.19%
Published
2022-03-23
Updated
2024-01-21
By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.
Max CVSS
5.3
EPSS Score
0.19%
Published
2022-09-21
Updated
2023-05-16
If a resolver cache has a very large number of ECS records stored for the same name, the process of cleaning the cache database node for this name can significantly impair query performance. This issue affects BIND 9 versions 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
Max CVSS
5.3
EPSS Score
0.05%
Published
2024-02-13
Updated
2024-02-13
Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.
Max CVSS
5.0
EPSS Score
0.29%
Published
1998-04-08
Updated
2018-10-30
DNS cache poisoning via BIND, by predictable query IDs.
Max CVSS
5.0
EPSS Score
0.75%
Published
1997-08-13
Updated
2022-08-17
Denial of service in BIND named via consuming more than "fdmax" file descriptors.
Max CVSS
5.0
EPSS Score
0.33%
Published
1999-11-10
Updated
2018-10-30
Denial of service in BIND named via maxdname.
Max CVSS
5.0
EPSS Score
0.30%
Published
1999-11-10
Updated
2008-09-09
Buffer overflow in INN 2.2.1 and earlier allows remote attackers to cause a denial of service via a maliciously formatted article.
Max CVSS
5.0
EPSS Score
0.65%
Published
2000-10-20
Updated
2008-09-10
named in BIND 8.2 through 8.2.2-P6 allows remote attackers to cause a denial of service by making a compressed zone transfer (ZXFR) request and performing a name service query on an authoritative record that is not cached, aka the "zxfr bug."
Max CVSS
5.0
EPSS Score
10.09%
Published
2000-12-19
Updated
2018-05-03
named in BIND 8.2 through 8.2.2-P6 allows remote attackers to cause a denial of service by sending an SRV record to the server, aka the "srv bug."
Max CVSS
5.0
EPSS Score
1.30%
Published
2000-12-19
Updated
2020-12-09
BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables.
Max CVSS
5.0
EPSS Score
0.71%
Published
2001-02-12
Updated
2008-09-10
51 vulnerabilities found
1 2 3
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!