Total
171 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2006-4096 | 1 Isc | 1 Bind | 2024-02-04 | 5.0 MEDIUM | N/A |
BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via a flood of recursive queries, which cause an INSIST failure when the response is received after the recursion queue is empty. | |||||
CVE-2006-0987 | 1 Isc | 1 Bind | 2024-02-04 | 5.0 MEDIUM | N/A |
The default configuration of ISC BIND before 9.4.1-P1, when configured as a caching name server, allows recursive queries and provides additional delegation information to arbitrary IP addresses, which allows remote attackers to cause a denial of service (traffic amplification) via DNS queries with spoofed source IP addresses. | |||||
CVE-1999-0849 | 1 Isc | 1 Bind | 2024-02-04 | 5.0 MEDIUM | N/A |
Denial of service in BIND named via maxdname. | |||||
CVE-2001-0012 | 1 Isc | 1 Bind | 2024-02-04 | 5.0 MEDIUM | N/A |
BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables. | |||||
CVE-2002-2213 | 2 Infoblox, Isc | 2 Dns One, Bind | 2024-02-04 | 5.0 MEDIUM | N/A |
The DNS resolver in unspecified versions of Infoblox DNS One, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods. | |||||
CVE-2002-2212 | 2 Fujitsu, Isc | 2 Uxp V, Bind | 2024-02-04 | 5.0 MEDIUM | N/A |
The DNS resolver in unspecified versions of Fujitsu UXP/V, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods. | |||||
CVE-2000-1029 | 1 Isc | 1 Bind | 2024-02-04 | 10.0 HIGH | N/A |
Buffer overflow in host command allows a remote attacker to execute arbitrary commands via a long response to an AXFR query. | |||||
CVE-2002-1219 | 3 Freebsd, Isc, Openbsd | 3 Freebsd, Bind, Openbsd | 2024-02-04 | 7.5 HIGH | N/A |
Buffer overflow in named in BIND 4 versions 4.9.10 and earlier, and 8 versions 8.3.3 and earlier, allows remote attackers to execute arbitrary code via a certain DNS server response containing SIG resource records (RR). | |||||
CVE-2000-0888 | 2 Debian, Isc | 2 Debian Linux, Bind | 2024-02-04 | 5.0 MEDIUM | N/A |
named in BIND 8.2 through 8.2.2-P6 allows remote attackers to cause a denial of service by sending an SRV record to the server, aka the "srv bug." | |||||
CVE-1999-0024 | 6 Bsdi, Ibm, Isc and 3 more | 12 Bsd Os, Aix, Bind and 9 more | 2024-02-04 | 5.0 MEDIUM | N/A |
DNS cache poisoning via BIND, by predictable query IDs. | |||||
CVE-2002-1220 | 3 Freebsd, Isc, Openbsd | 3 Freebsd, Bind, Openbsd | 2024-02-04 | 5.0 MEDIUM | N/A |
BIND 8.3.x through 8.3.3 allows remote attackers to cause a denial of service (termination due to assertion failure) via a request for a subdomain that does not exist, with an OPT resource record with a large UDP payload size. | |||||
CVE-1999-0011 | 8 Data General, Ibm, Isc and 5 more | 11 Dg Ux, Aix, Bind and 8 more | 2024-02-04 | 10.0 HIGH | N/A |
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer. | |||||
CVE-2002-0684 | 2 Gnu, Isc | 2 Glibc, Bind | 2024-02-04 | 7.5 HIGH | N/A |
Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr. | |||||
CVE-2000-0887 | 1 Isc | 1 Bind | 2024-02-04 | 5.0 MEDIUM | N/A |
named in BIND 8.2 through 8.2.2-P6 allows remote attackers to cause a denial of service by making a compressed zone transfer (ZXFR) request and performing a name service query on an authoritative record that is not cached, aka the "zxfr bug." | |||||
CVE-1999-0848 | 2 Isc, Sun | 3 Bind, Solaris, Sunos | 2024-02-04 | 5.0 MEDIUM | N/A |
Denial of service in BIND named via consuming more than "fdmax" file descriptors. | |||||
CVE-2002-0400 | 1 Isc | 1 Bind | 2024-02-04 | 5.0 MEDIUM | N/A |
ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype. | |||||
CVE-2002-1221 | 3 Freebsd, Isc, Openbsd | 3 Freebsd, Bind, Openbsd | 2024-02-04 | 5.0 MEDIUM | N/A |
BIND 8.x through 8.3.3 allows remote attackers to cause a denial of service (crash) via SIG RR elements with invalid expiry times, which are removed from the internal BIND database and later cause a null dereference. | |||||
CVE-1999-0837 | 2 Isc, Sun | 3 Bind, Solaris, Sunos | 2024-02-04 | 10.0 HIGH | N/A |
Denial of service in BIND by improperly closing TCP sessions via so_linger. | |||||
CVE-2002-0029 | 2 Astaro, Isc | 2 Security Linux, Bind | 2024-02-04 | 7.5 HIGH | N/A |
Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka "LIBRESOLV: buffer overrun" and a different vulnerability than CVE-2002-0684. | |||||
CVE-2002-2211 | 1 Isc | 1 Bind | 2024-02-04 | 5.0 MEDIUM | N/A |
BIND 4 and BIND 8, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods. |