CVE-2015-4620

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.

References

http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162040.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162286.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html

http://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html

http://marc.info/?l=bugtraq&m=143740940810833&w=2

http://rhn.redhat.com/errata/RHSA-2015-1443.html

http://rhn.redhat.com/errata/RHSA-2015-1471.html

http://www.debian.org/security/2015/dsa-3304

http://www.securityfocus.com/bid/75588

http://www.securitytracker.com/id/1032799

http://www.ubuntu.com/usn/USN-2669-1

https://kb.isc.org/article/AA-01267

https://kb.isc.org/article/AA-01305

https://kb.isc.org/article/AA-01306

https://kb.isc.org/article/AA-01307

https://kb.isc.org/article/AA-01438

https://kb.juniper.net/JSA10783

https://kc.mcafee.com/corporate/index?page=content&id=SB10124

https://security.gentoo.org/glsa/201510-01

https://security.netapp.com/advisory/ntap-20190903-0003/

Details

Source: MITRE

Published: 2015-07-08

Updated: 2018-10-30

Type: CWE-17

Risk Information

CVSS v2

Base Score: 7.8

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.7.7:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.6:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.8.6:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:b2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.4:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.5:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.6:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.6:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.7:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.7:rc1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.7:rc2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*

Tenable Plugins

View all (25 total)

IDNameProductFamilySeverity
137170OracleVM 3.3 / 3.4 : bind (OVMSA-2020-0021)NessusOracleVM Local Security Checks
high
124936EulerOS Virtualization 3.0.1.0 : bind (EulerOS-SA-2019-1433)NessusHuawei Local Security Checks
medium
99569OracleVM 3.3 / 3.4 : bind (OVMSA-2017-0066)NessusOracleVM Local Security Checks
high
86435GLSA-201510-01 : BIND: Denial of ServiceNessusGentoo Local Security Checks
high
85190Scientific Linux Security Update : bind on SL6.x i386/x86_64 (20150722)NessusScientific Linux Local Security Checks
high
85146OracleVM 3.3 : bind (OVMSA-2015-0105)NessusOracleVM Local Security Checks
high
85114Oracle Linux 6 : bind (ELSA-2015-1471)NessusOracle Linux Local Security Checks
high
85054F5 Networks BIG-IP : BIND vulnerability (SOL16912)NessusF5 Networks Local Security Checks
high
85028CentOS 6 : bind (CESA-2015:1471)NessusCentOS Local Security Checks
high
84954RHEL 6 : bind (RHSA-2015:1471)NessusRed Hat Local Security Checks
high
84926Amazon Linux AMI : bind (ALAS-2015-566)NessusAmazon Linux Local Security Checks
high
84905Fedora 21 : bind-9.9.6-9.P1.fc21 (2015-11484)NessusFedora Local Security Checks
high
84894Scientific Linux Security Update : bind on SL7.x x86_64 (20150720)NessusScientific Linux Local Security Checks
high
84892RHEL 7 : bind (RHSA-2015:1443)NessusRed Hat Local Security Checks
high
84889Oracle Linux 7 : bind (ELSA-2015-1443)NessusOracle Linux Local Security Checks
high
84883CentOS 7 : bind (CESA-2015:1443)NessusCentOS Local Security Checks
high
84852Fedora 22 : bind-9.10.2-3.P2.fc22 (2015-11483)NessusFedora Local Security Checks
high
84816openSUSE Security Update : bind (openSUSE-2015-494)NessusSuSE Local Security Checks
high
84728ISC BIND 9.7.x < 9.9.7-P1 / 9.10.x < 9.10.2-P2 Resolver DNSSEC Validation DoSNessusDNS
high
84676Debian DLA-270-1 : bind9 security updateNessusDebian Local Security Checks
high
84633SUSE SLED11 / SLES11 Security Update : bind (SUSE-SU-2015:1205-1)NessusSuSE Local Security Checks
high
84632SUSE SLED12 / SLES12 Security Update : bind (SUSE-SU-2015:1204-1)NessusSuSE Local Security Checks
high
84620Ubuntu 12.04 LTS / 14.04 LTS / 14.10 / 15.04 : bind9 vulnerability (USN-2669-1)NessusUbuntu Local Security Checks
high
84599Debian DSA-3304-1 : bind9 - security updateNessusDebian Local Security Checks
high
84591Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : bind (SSA:2015-188-04)NessusSlackware Local Security Checks
high