CVE-2015-1349

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.

References

http://advisories.mageia.org/MGASA-2015-0082.html

http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150904.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150905.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html

http://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html

http://marc.info/?l=bugtraq&m=143740940810833&w=2

http://rhn.redhat.com/errata/RHSA-2015-0672.html

http://www.mandriva.com/security/advisories?name=MDVSA-2015:054

http://www.mandriva.com/security/advisories?name=MDVSA-2015:165

http://www.ubuntu.com/usn/USN-2503-1

https://bugzilla.redhat.com/show_bug.cgi?id=1193820

https://kb.isc.org/article/AA-01235

https://kb.juniper.net/JSA10783

https://kc.mcafee.com/corporate/index?page=content&id=SB10116

https://security.gentoo.org/glsa/201510-01

https://support.apple.com/HT205219

Details

Source: MITRE

Published: 2015-02-19

Updated: 2018-10-30

Type: CWE-399

Risk Information

CVSS v2

Base Score: 5.4

Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 4.9

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.7:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.6:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.6:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:b2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.4:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.5:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.6:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.6:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.7:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*

Tenable Plugins

View all (30 total)

IDNameProductFamilySeverity
137170OracleVM 3.3 / 3.4 : bind (OVMSA-2020-0021)NessusOracleVM Local Security Checks
high
124936EulerOS Virtualization 3.0.1.0 : bind (EulerOS-SA-2019-1433)NessusHuawei Local Security Checks
medium
99569OracleVM 3.3 / 3.4 : bind (OVMSA-2017-0066)NessusOracleVM Local Security Checks
high
86435GLSA-201510-01 : BIND: Denial of ServiceNessusGentoo Local Security Checks
high
86066Mac OS X : OS X Server < 5.0.3 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
85146OracleVM 3.3 : bind (OVMSA-2015-0105)NessusOracleVM Local Security Checks
high
84816openSUSE Security Update : bind (openSUSE-2015-494)NessusSuSE Local Security Checks
high
84633SUSE SLED11 / SLES11 Security Update : bind (SUSE-SU-2015:1205-1)NessusSuSE Local Security Checks
high
84632SUSE SLED12 / SLES12 Security Update : bind (SUSE-SU-2015:1204-1)NessusSuSE Local Security Checks
high
82914Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : bind (SSA:2015-111-01)NessusSlackware Local Security Checks
high
82539F5 Networks BIG-IP : BIND vulnerability (K16356)NessusF5 Networks Local Security Checks
medium
82418Mandriva Linux Security Advisory : bind (MDVSA-2015:165)NessusMandriva Local Security Checks
high
82147Debian DLA-163-1 : bind9 security updateNessusDebian Local Security Checks
medium
81948OracleVM 3.3 : bind (OVMSA-2015-0033)NessusOracleVM Local Security Checks
medium
81937Mandriva Linux Security Advisory : bind (MDVSA-2015:054)NessusMandriva Local Security Checks
medium
81826Amazon Linux AMI : bind (ALAS-2015-490)NessusAmazon Linux Local Security Checks
medium
81770Scientific Linux Security Update : bind on SL6.x, SL7.x i386/x86_64 (20150311)NessusScientific Linux Local Security Checks
medium
81759CentOS 6 / 7 : bind (CESA-2015:0672)NessusCentOS Local Security Checks
medium
81750RHEL 7 : bind (RHSA-2015:0672)NessusRed Hat Local Security Checks
medium
81749Oracle Linux 6 / 7 : bind (ELSA-2015-0672)NessusOracle Linux Local Security Checks
medium
81657Fedora 20 : bind-9.9.4-18.P2.fc20 (2015-2548)NessusFedora Local Security Checks
medium
81656Fedora 21 : bind-9.9.6-8.P1.fc21 (2015-2543)NessusFedora Local Security Checks
medium
81490ISC BIND 9.9.7.x < 9.9.7rc2 Multiple VulnerabilitiesNessusDNS
high
81489ISC BIND 9.7.0.x < 9.9.6-P2 DNSSEC Validation DoSNessusDNS
medium
81488ISC BIND 9.9.6-S2 DNSSEC Validation DoSNessusDNS
medium
81487ISC BIND 9.10.2 < 9.10.2rc2 Multiple VulnerabilitiesNessusDNS
high
81486ISC BIND 9.10.x < 9.10.1-P2 DNSSEC Validation DoSNessusDNS
medium
81462FreeBSD : bind -- denial of service vulnerability (58033a95-bba8-11e4-88ae-d050992ecde8)NessusFreeBSD Local Security Checks
medium
81412Ubuntu 12.04 LTS / 14.04 LTS / 14.10 : bind9 vulnerability (USN-2503-1)NessusUbuntu Local Security Checks
medium
81409Debian DSA-3162-1 : bind9 - security updateNessusDebian Local Security Checks
medium