CVE-2013-4854

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.

References

http://archives.neohapsis.com/archives/bugtraq/2013-08/0030.html

http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html

http://linux.oracle.com/errata/ELSA-2014-1244

http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113108.html

http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113251.html

http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00004.html

http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00018.html

http://rhn.redhat.com/errata/RHSA-2013-1114.html

http://rhn.redhat.com/errata/RHSA-2013-1115.html

http://secunia.com/advisories/54134

http://secunia.com/advisories/54185

http://secunia.com/advisories/54207

http://secunia.com/advisories/54211

http://secunia.com/advisories/54323

http://secunia.com/advisories/54432

http://www.debian.org/security/2013/dsa-2728

http://www.freebsd.org/security/advisories/FreeBSD-SA-13:07.bind.asc

http://www.mandriva.com/security/advisories?name=MDVSA-2013:202

http://www.securityfocus.com/bid/61479

http://www.securitytracker.com/id/1028838

http://www.ubuntu.com/usn/USN-1910-1

http://www.zerodayinitiative.com/advisories/ZDI-13-210/

https://exchange.xforce.ibmcloud.com/vulnerabilities/86004

https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03922396

https://kb.isc.org/article/AA-01015

https://kb.isc.org/article/AA-01016

https://kc.mcafee.com/corporate/index?page=content&id=SB10052

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19561

https://support.apple.com/kb/HT6536

Details

Source: MITRE

Published: 2013-07-29

Updated: 2019-04-22

Risk Information

CVSS v2

Base Score: 7.8

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.7:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp2:*:*:*:*:*:*

cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*

cpe:2.3:o:novell:suse_linux:11:*:desktop:*:*:*:*:*

cpe:2.3:o:novell:suse_linux:11:*:server:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:isc:dnsco_bind:9.9.3:s1:*:*:*:*:*:*

cpe:2.3:a:isc:dnsco_bind:9.9.4:s1b1:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:b2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:rc2:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:o:freebsd:freebsd:8.0:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:8.1:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:8.2:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:8.3:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:8.4:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.0:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.1:p4:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.1:p5:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.2:prerelease:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.2:rc1:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.2:rc2:*:*:*:*:*:*

Configuration 7

OR

cpe:2.3:o:mandriva:business_server:1.0:*:*:*:*:*:*:*

cpe:2.3:o:mandriva:enterprise_server:5.0:*:*:*:*:*:*:*

Configuration 8

OR

cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

Configuration 9

OR

cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:*

Configuration 10

OR

cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*

cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*

Configuration 11

OR

cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*

Configuration 12

OR

cpe:2.3:o:slackware:slackware_linux:12.1:*:*:*:*:*:*:*

cpe:2.3:o:slackware:slackware_linux:12.2:*:*:*:*:*:*:*

cpe:2.3:o:slackware:slackware_linux:13.0:*:*:*:*:*:*:*

cpe:2.3:o:slackware:slackware_linux:13.1:*:*:*:*:*:*:*

cpe:2.3:o:slackware:slackware_linux:13.37:*:*:*:*:*:*:*

Tenable Plugins

View all (29 total)

IDNameProductFamilySeverity
147379NewStart CGSL CORE 5.04 / MAIN 5.04 : bind Multiple Vulnerabilities (NS-SA-2021-0017)NessusNewStart CGSL Local Security Checks
critical
137170OracleVM 3.3 / 3.4 : bind (OVMSA-2020-0021)NessusOracleVM Local Security Checks
high
99569OracleVM 3.3 / 3.4 : bind (OVMSA-2017-0066)NessusOracleVM Local Security Checks
high
80247OracleVM 3.3 : bind (OVMSA-2014-0084)NessusOracleVM Local Security Checks
high
78601Mac OS X : OS X Server < 4.0 Multiple Vulnerabilities (POODLE)NessusMacOS X Local Security Checks
high
78154F5 Networks BIG-IP : BIND vulnerability (SOL14613)NessusF5 Networks Local Security Checks
high
76120McAfee Web Gateway < 7.3.2.2 DoS (SB10052)NessusMisc.
high
76118McAfee Firewall Enterprise DoS (SB10052)NessusFirewalls
high
75123openSUSE Security Update : bind (openSUSE-SU-2013:1353-1)NessusSuSE Local Security Checks
high
72208GLSA-201401-34 : BIND: Denial of ServiceNessusGentoo Local Security Checks
high
70218Amazon Linux AMI : bind (ALAS-2013-214)NessusAmazon Linux Local Security Checks
high
6964ISC BIND 9 DNS RDATA Handling Remote DoSNessus Network MonitorDNS Servers
high
69259SuSE 11.2 / 11.3 Security Update : bind (SAT Patch Numbers 8160 / 8161)NessusSuSE Local Security Checks
high
69224Slackware 12.1 / 12.2 / 13.0 / 13.1 / 13.37 / 14.0 / current : bind (SSA:2013-218-01)NessusSlackware Local Security Checks
high
69211Fedora 19 : bind-9.9.3-5.P2.fc19 (2013-13863)NessusFedora Local Security Checks
high
69210Fedora 18 : bind-9.9.3-4.P2.fc18 (2013-13831)NessusFedora Local Security Checks
high
69165Scientific Linux Security Update : bind on SL6.x i386/x86_64 (20130730)NessusScientific Linux Local Security Checks
high
69164Scientific Linux Security Update : bind97 on SL5.x i386/x86_64 (20130730)NessusScientific Linux Local Security Checks
high
69157Oracle Linux 5 : bind97 (ELSA-2013-1115)NessusOracle Linux Local Security Checks
high
69156Oracle Linux 6 : bind (ELSA-2013-1114)NessusOracle Linux Local Security Checks
high
69141CentOS 5 : bind97 (CESA-2013:1115)NessusCentOS Local Security Checks
high
69140CentOS 6 : bind (CESA-2013:1114)NessusCentOS Local Security Checks
high
69119Ubuntu 10.04 LTS / 12.04 LTS / 12.10 / 13.04 : bind9 vulnerability (USN-1910-1)NessusUbuntu Local Security Checks
high
69111RHEL 5 : bind97 (RHSA-2013:1115)NessusRed Hat Local Security Checks
high
69110RHEL 6 : bind (RHSA-2013:1114)NessusRed Hat Local Security Checks
high
69106ISC BIND 9 RDATA Section Handling DoSNessusDNS
high
69097Mandriva Linux Security Advisory : bind (MDVSA-2013:202)NessusMandriva Local Security Checks
high
69094Debian DSA-2728-1 : bind9 - denial of serviceNessusDebian Local Security Checks
high
69088FreeBSD : bind -- denial of service vulnerability (7943e521-f648-11e2-8607-3c970e169bc2)NessusFreeBSD Local Security Checks
high