Vulnerability Details : CVE-2005-0033
Buffer overflow in the code for recursion and glue fetching in BIND 8.4.4 and 8.4.5 allows remote attackers to cause a denial of service (crash) via queries that trigger the overflow in the q_usedns array that tracks nameservers and addresses.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2005-0033
- cpe:2.3:a:isc:bind:8.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:8.4.4:*:*:*:*:*:*:*
Threat overview for CVE-2005-0033
Top countries where our scanners detected CVE-2005-0033
Top open port discovered on systems with this issue
53
IPs affected by CVE-2005-0033 19
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2005-0033!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2005-0033
6.74%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-0033
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2005-0033
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/19063
-
http://www.uniras.gov.uk/niscc/docs/al-20050125-00059.html
Patch
-
http://www.securityfocus.com/bid/12364
-
http://www.isc.org/index.pl?/sw/bind/bind8.php
Patch
-
http://www.kb.cert.org/vuls/id/327633
Third Party Advisory;US Government Resource
-
http://securitytracker.com/id?1012996
-
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.1/SCOSA-2006.1.txt
-
http://www.isc.org/index.pl?/sw/bind/bind-security.php
Oops! - ISCPatch
Jump to