CVE-2012-5689
Published: 25 January 2013
ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record.
Notes
Author | Note |
---|---|
mdeslaur | uncommon setup: must be using RPZ rewrite rules and also be using DNS64. Setting priority as "low" |
Priority
Status
Package | Release | Status |
---|---|---|
bind9 Launchpad, Ubuntu, Debian |
hardy |
Not vulnerable
|
lucid |
Not vulnerable
|
|
oneiric |
Not vulnerable
|
|
precise |
Released
(1:9.8.1.dfsg.P1-4ubuntu0.12)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Not vulnerable
(1:9.9.5.dfsg-3ubuntu0.1)
|
|
upstream |
Needed
|
|
utopic |
Not vulnerable
(1:9.9.5.dfsg-4.3ubuntu0.1)
|
|
vivid |
Not vulnerable
(1:9.9.5.dfsg-6ubuntu1)
|
|
Patches: vendor: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699145 |