CVE-2011-2465

low
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Unspecified vulnerability in ISC BIND 9 9.8.0, 9.8.0-P1, 9.8.0-P2, and 9.8.1b1, when recursion is enabled and the Response Policy Zone (RPZ) contains DNAME or certain CNAME records, allows remote attackers to cause a denial of service (named daemon crash) via an unspecified query.

References

http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062522.html

http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00002.html

http://osvdb.org/73604

http://secunia.com/advisories/45185

http://www.isc.org/software/bind/advisories/cve-2011-2465

http://www.kb.cert.org/vuls/id/137968

http://www.securityfocus.com/archive/1/518750/100/0/threaded

http://www.securityfocus.com/bid/48565

http://www.securitytracker.com/id?1025743

https://exchange.xforce.ibmcloud.com/vulnerabilities/68374

Details

Source: MITRE

Published: 2011-07-08

Updated: 2018-10-09

Risk Information

CVSS v2

Base Score: 2.6

Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 4.9

Severity: LOW

Tenable Plugins

View all (5 total)

IDNameProductFamilySeverity
59629GLSA-201206-01 : BIND: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
55562Fedora 15 : bind-9.8.0-7.P4.fc15 (2011-9146)NessusFedora Local Security Checks
medium
5981ISC BIND 9 Response Policy Zones (RPZ) DNAME / CNAME Parsing Remote DoSNessus Network MonitorDNS Servers
medium
55533ISC BIND Response Policy Zones (RPZ) DNAME / CNAME Parsing Remote DoSNessusDNS
high
55517FreeBSD : BIND -- Remote DoS with certain RPZ configurations (4ccee784-a721-11e0-89b4-001ec9578670)NessusFreeBSD Local Security Checks
low