CVE-2010-0290
Vulnerability from cvelistv5
Published
2010-01-22 21:20
Modified
2024-08-07 00:45
Severity ?
Summary
Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains (1) CNAME or (2) DNAME records, which do not have the intended validation before caching, aka Bug 20737. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-4022.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
secalert@redhat.comhttp://marc.info/?l=oss-security&m=126393609503704&w=2
secalert@redhat.comhttp://marc.info/?l=oss-security&m=126399602810086&w=2
secalert@redhat.comhttp://secunia.com/advisories/38219Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/38240Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/40086
secalert@redhat.comhttp://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
secalert@redhat.comhttp://www.debian.org/security/2010/dsa-2054
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:021
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-888-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/0176Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/0622
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1352
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=554851
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=557121
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6815
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7512
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8884
secalert@redhat.comhttps://rhn.redhat.com/errata/RHSA-2010-0062.html
secalert@redhat.comhttps://www.isc.org/advisories/CVE-2009-4022v6Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=126393609503704&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=126399602810086&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38219Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38240Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40086
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2010/dsa-2054
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:021
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-888-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0176Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0622
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1352
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=554851
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=557121
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6815
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7512
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8884
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2010-0062.html
af854a3a-2127-422b-91ae-364da2661108https://www.isc.org/advisories/CVE-2009-4022v6Vendor Advisory
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:45:11.627Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=557121"
          },
          {
            "name": "ADV-2010-0176",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0176"
          },
          {
            "name": "RHSA-2010:0062",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2010-0062.html"
          },
          {
            "name": "[oss-security] 20100119 BIND CVE-2009-4022 fix incomplete",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=126393609503704\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.isc.org/advisories/CVE-2009-4022v6"
          },
          {
            "name": "38240",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38240"
          },
          {
            "name": "oval:org.mitre.oval:def:6815",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6815"
          },
          {
            "name": "ADV-2010-1352",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1352"
          },
          {
            "name": "USN-888-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-888-1"
          },
          {
            "name": "40086",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40086"
          },
          {
            "name": "ADV-2010-0622",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0622"
          },
          {
            "name": "38219",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38219"
          },
          {
            "name": "MDVSA-2010:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:021"
          },
          {
            "name": "oval:org.mitre.oval:def:8884",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8884"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554851"
          },
          {
            "name": "[oss-security] 20100120 Re: BIND CVE-2009-4022 fix incomplete",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=126399602810086\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"
          },
          {
            "name": "DSA-2054",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2010/dsa-2054"
          },
          {
            "name": "SUSE-SA:2010:008",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"
          },
          {
            "name": "oval:org.mitre.oval:def:7512",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7512"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-01-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains (1) CNAME or (2) DNAME records, which do not have the intended validation before caching, aka Bug 20737.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-4022."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=557121"
        },
        {
          "name": "ADV-2010-0176",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0176"
        },
        {
          "name": "RHSA-2010:0062",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2010-0062.html"
        },
        {
          "name": "[oss-security] 20100119 BIND CVE-2009-4022 fix incomplete",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=126393609503704\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.isc.org/advisories/CVE-2009-4022v6"
        },
        {
          "name": "38240",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38240"
        },
        {
          "name": "oval:org.mitre.oval:def:6815",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6815"
        },
        {
          "name": "ADV-2010-1352",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1352"
        },
        {
          "name": "USN-888-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-888-1"
        },
        {
          "name": "40086",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40086"
        },
        {
          "name": "ADV-2010-0622",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0622"
        },
        {
          "name": "38219",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38219"
        },
        {
          "name": "MDVSA-2010:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:021"
        },
        {
          "name": "oval:org.mitre.oval:def:8884",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8884"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554851"
        },
        {
          "name": "[oss-security] 20100120 Re: BIND CVE-2009-4022 fix incomplete",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=126399602810086\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"
        },
        {
          "name": "DSA-2054",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2010/dsa-2054"
        },
        {
          "name": "SUSE-SA:2010:008",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"
        },
        {
          "name": "oval:org.mitre.oval:def:7512",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7512"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-0290",
    "datePublished": "2010-01-22T21:20:00",
    "dateReserved": "2010-01-12T00:00:00",
    "dateUpdated": "2024-08-07T00:45:11.627Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2010-0290\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2010-01-22T22:00:00.617\",\"lastModified\":\"2024-11-21T01:11:54.777\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains (1) CNAME or (2) DNAME records, which do not have the intended validation before caching, aka Bug 20737.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-4022.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad no especificada en ISC BIND 9.0.x a 9.3.x, 9.4 en versiones anteriores a la 9.4.3-P5, 9.5 en versiones anteriores a la 9.5.2-P2, 9.6 en versiones anteriores a la 9.6.1-P3, y 9.7.0 beta, con la validaci\u00f3n DNSSEC habilitada y el chequeo (CD) deshabilitado, permite a atacantes remotos realizar ataques de envenenamiento de cache DNS mediante la recepci\u00f3n de una petici\u00f3n recursiva de cliente y el env\u00edo de una respuesta que contiene registros (1) CNAME o (2) DNAME, los cuales no realizan la validaci\u00f3n establecida antes de cachear, tambi\u00e9n conocida como Bug 20737. NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incompleta de CVE-2009-4022.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:P/A:P\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C52373DC-3E05-424B-9C78-4092A75C75A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFE06E29-0A16-4034-A2BB-696A49798F00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"75CECA87-F721-429B-8062-D3297233C14D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F1447B1-A25F-45CC-B721-3204D7107999\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"C61FB240-C932-4A3A-874D-5872F01EB352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"999AF289-8D73-4648-ABCB-4853B9B1F230\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.0:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6743968D-DDB2-4478-867A-642CCC492B96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"098633E6-88F0-4DBC-986F-D11EDA29877F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"78725CCE-C153-4B00-8E76-ED6DFC1C86A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1950F046-FBD4-4A92-BA70-5E80374A12AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1861756C-CC81-4EAB-8427-57A3C62BFF96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E53EFD9-16B8-457D-8C27-7771018EA524\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDD642FC-1764-4090-A32D-830CEAE69E53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"79503328-9EE2-414E-A6E8-B3BABA0D6CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ABA5AA3-8951-4158-A4C6-64BE2010D39B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.1:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A2D767-8E2D-4D65-ACF3-634B055023CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.1:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D28C3D4C-5C3B-4686-9F67-6379C2AC338A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.1:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"543DE620-09A2-4055-B30C-803C714237B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.1:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C16513C-48A1-4FB6-AB11-F844ABC4BB66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.1:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"607BF60B-27F1-4C85-BB5F-D66FEA05CD4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE954FD0-56AF-4757-BAA8-B0C64703F6AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EC243E5-D80C-43A8-AD12-5DA0FA442086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF891263-4ACE-47C3-83F3-C06E49F32451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"01C3704B-8328-46C3-ACB1-D27FD7DED508\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF9000CE-EB3A-4194-84D1-4BB4C5010D29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A4E6C3-CF69-4A81-B179-EB8F656E72AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F947835-8E96-4793-B81E-EEC103BF0CB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6520F4-B203-400A-8629-8A40B739DB11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"55D7907A-46D1-4F7D-8B2F-321214204704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:a2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06686CF-0FFD-45D8-A9F6-D13DCF3E6EB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:a3:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF04613-7F33-4A63-A776-47C9A0BDBF1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA3C3939-2065-4A8C-99F8-BE44D1D2ABA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEE416F3-CDAE-4285-9EC7-F3E161EDCA0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"365BFA38-A0F6-4D48-A6B5-E534F88516DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc10:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF2F3360-F5C2-47C1-B2E7-935CDB47407A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"52FBAE24-C9F7-4756-A7A0-A877ABFC3444\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7230CE4-CD95-484C-A004-457FD4484403\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0BB3172-BFBC-4F56-8116-6EEC30FD566F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D40FB919-A955-419D-9BEC-835F93E4FEF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF8A8F48-A890-4837-8C76-1A690523B39B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"399D70C9-8E61-4624-A7AD-9410AA7641B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BB2F03D-96C6-49CD-80FA-570FF72B493F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"60DC3DF4-4B36-4AA8-8561-C4255A8C4E18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AF07E87-B109-4B15-A358-7A454502E077\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E5D0852-413F-4875-93F5-64DDBCA6E85E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"301BF336-6AF6-4705-9BF1-00ED6608F572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"614C9459-D526-4880-AE03-4A1558CB941F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.2:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8B15E71-656A-4EB7-96B2-2CC9A2C19DC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A969C3E7-9E4F-4767-86D1-7E6B3970A7B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"34B56EBF-6218-46B7-A9F2-288E40635FAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CFA05CD-0BE4-4E85-A3DE-8B3E2622159F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10ACCBC-6697-4BCB-9748-B966D83E0C03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"719382EA-7D4E-46F2-92ED-DCA83AE685BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EDF0B51-76D3-4BD8-A2C7-6F21153CB886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.3:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D800F08-9B7A-4284-B2EF-DCDF60DEEC04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D43375C5-0736-43DE-99B5-B75719D0AD0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.4:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E492452-CBDB-43BC-A9AD-21AA84EA0653\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.4:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5BD68D9-6CD9-48A7-A242-38B9ADD420BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.4:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"65C15AB2-DCA7-4983-A741-3CA1D4A391A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.4:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C6DB780-C075-462C-B426-1917A020C4BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.4:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B4FD922-49B2-4953-8EF2-9018B104BC20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.4:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"367DC15C-7174-4463-8D4B-B3E43AC0A57E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.4:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAEC7B62-DBBF-4ADD-81F7-8AD1F3642E92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4360536-0BA6-41DB-AA87-45AFB51562CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.5:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3CBD1CC-14DF-4F00-9A5E-6D7A6604A8A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"93C5ED24-5A13-4F06-BC9F-B8B8F46C1888\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"438AEC8C-DD71-4A25-9E9D-A89415F7EC83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"36A47938-C5AC-4471-A791-6F21AE20B85C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDF6B08-6BA8-400C-BF01-ABD2306FE0D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.7:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFEDAAA4-AB94-43C6-97AE-B6E87D8E81B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.7:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAF29410-5230-42F9-BC07-B940FC66DA62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.7:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"82068202-DF42-4808-A5C7-1A68B05EA1C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3014690C-784C-487D-A378-4B977C8460E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90E4653A-C63A-4568-BFF2-ECAB7AB5A55C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.9:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCF6B377-2B03-429D-B452-3269E6FA8031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FA93166-513D-40AA-9855-FC89060BA03C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"847C1017-F964-4A33-BEA8-DDB202DD0FB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.0:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B48470-26BF-4AE5-BEF3-7A2C82D59513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.0:b3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D795C310-AC2A-4680-B516-508F7AF584AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.0:b4:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAA7F932-4DA1-4B03-8761-AB2353B4935E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5DC0048-3DC4-40A7-99A2-7686B3DA4FF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43C77D0-2052-417D-9EA8-1A89A06BF010\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F574AA97-6037-4957-9BDD-6C720B3A292B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B67499F-7A9D-467B-834B-F4D61DBBE313\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B0D8854-64B6-42C9-B4D2-B2AF16AC0F03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.1:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CB6CACC-3E1E-4115-AC9B-C9F99522D4C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"062A3D39-9B49-49D3-8FB4-FB4FC4A71D34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92F95086-3107-4C38-BB3B-7BABA9BD15C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8669EA1C-DAA7-44FC-B675-01641BB8787E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AE49740-2220-4305-BB8A-80E56CF4D9E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD5E3F3-CAF7-4A41-A26E-087D74799EF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9730D243-BBDF-483B-B709-7EDF708CE277\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAD0B6DB-91E5-4891-BA45-A68BEA6FBB51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5B579EF-A538-4AA4-BDE8-CDB39E155A83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23BFA179-11A1-436D-805A-9814B85AEEB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D881EBA-B012-4014-A08F-F6B3795653C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.5:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9431455C-07E8-40E7-87D9-E6FE6F53D76D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01CA8370-ACF5-4DEC-8D3C-C502A97A101C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A92E77F8-43FE-49C7-BCDA-1F6E8EB0DD2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C8B18D7-4D15-46A7-8013-E6267127A427\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D7C7524-6943-4D94-8835-0221F0F0CD63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B45FE3-307E-4599-B2CF-5203FA606469\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:a2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F12E3841-1CF0-4969-A286-50769BAE31EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:a3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8B11586-1274-422D-873A-25DF193FB0C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:a4:*:*:*:*:*:*\",\"matchCriteriaId\":\"87D61CDA-BB78-4957-A502-6D77B567B3F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:a5:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A31533C-BD6E-4EB4-8047-3257BF51F592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:a6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8537C88-4F73-43DD-9BDC-AF470882EED2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D7D1A96-0A8E-4E3A-9442-701E3D1A1F5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"93C23313-817F-4AB5-9058-31B0C7F954A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:b3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA9F93EC-1AA2-43A6-9869-8974C819370A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:b4:*:*:*:*:*:*\",\"matchCriteriaId\":\"726720E2-4B59-4665-A72E-E2E996957EAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F0AA9D0-9657-4E18-BF8B-45284C2D40A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E4FEA8-A654-4E9F-8948-5878E7C427C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"916D4013-27A5-4688-A985-A9B77F90AC45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8583B8D-54A4-4064-810B-34F4F5A33A36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"932E3F02-DD98-43FC-8077-50506E512989\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"63C2A2FD-7AE7-462A-99B2-809BE1F35C15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E01A12DF-E94B-426E-8751-96FC56105D5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7717B1A2-CAF5-49F3-AC73-273074BBEE02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F037EE61-50D6-4C1E-B24B-25A6D212E7E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:b3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5140F118-BC25-43CB-B19C-0885A44D6646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"099A0900-9A16-4431-BECA-B02D7C810153\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"82B9397F-463E-4F73-86F6-4EF3368E14BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAC96840-758A-4A47-8D12-AA42640778C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A6BE65-7F8F-4B5E-B2BB-0290974A5358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF68DD55-F39E-480E-AE86-9ABF1B068E6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"19ADAB10-BDD0-409E-93C2-9E7223464131\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F42F7AF7-D37C-4213-B2BC-D2B9FE725BDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A964450E-7DA8-478B-923E-E8CD1BA0F09C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"32FAE1EF-3BF0-4B12-8F08-AA061A6D63FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ABB3FC8-0A0D-4881-9137-5F6A8CCB9345\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C02A3BC0-78A4-4F4D-AA5B-3C05122137EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"178C7D9F-8699-42A3-8729-0BC6323EBDF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BEF53C6-E555-49D4-B4B2-63BA71CC77E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.1:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B4565A6-122B-406C-A7BE-A029F92799B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C09FA4C-B094-4BAC-A194-ACC28F80AF69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.1:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6711B30D-4B57-4DDF-BC1E-98736B23E763\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEC21220-4207-4FE4-A7A9-9B223301B98D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE753CB-A16D-4605-8640-137CD4A2BB16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92ECA27E-4248-49BD-A84C-4854CCA19AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B0C031F-96F1-4117-83B7-82EE749FC6BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D7D5B7-5696-4B51-954E-F32DF9617D9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B953804-C53B-4C77-AAE4-C60961C23A39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"51BBFF21-4E77-44EC-B472-6925904772AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FAA10DC-71AC-4E56-900A-B69B24917DE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A0C5E26-B896-449D-B004-337C9C0C40F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"444326E3-9D0D-4C9F-9B86-2AB6ADE1F405\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"812CD568-82C1-4F44-99BA-1F1DF3AF16EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16EB6777-8E49-4B07-B859-06D0C2F29DC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2574190-E1DC-46B9-AE82-5581960D8819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB06ECC-D36F-4BE7-93BF-8B1C025298EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"54E5A7DC-D432-470A-B95A-AF8EE1ECB561\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6F3181D-BB94-4700-A66C-8503B7B4107C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EB2A5D6-DEDF-4962-8117-2F1FADB5B984\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"26B6584A-707A-463C-BB2F-1D663FE50C01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D35C161A-3CCC-4FFC-9698-98FAE71BBF2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6518FD7D-0249-4793-9531-E5338EEC4C7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D468B433-D785-4A5B-A8CC-B2F1B27BAB7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BCF9BD9-F557-408C-9CD7-BD0EAD66366F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"407F36C2-886C-48A7-A3AB-E5F9194775D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"24CEA3F3-C4F8-4BD1-92EA-AC1B54A3CFE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"574C2F69-C5A0-48C6-8F13-C164518B8ED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40BD4A8C-785C-4460-AB52-B249C5DC9BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AAE7145-F1BA-4BEA-841E-DEE08891A3D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"88359A5D-CE32-4920-BE5D-98EC262B41EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B77760E4-57C5-4A5E-A169-C84409930757\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"24E9CBCA-241C-4EF6-8C0C-FA32E81B8B7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"893ACAAC-406E-4A1C-970B-A15B42961271\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126393609503704\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126399602810086\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/38219\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/38240\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/40086\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2010/dsa-2054\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:021\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-888-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0176\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0622\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1352\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=554851\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=557121\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6815\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7512\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8884\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2010-0062.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.isc.org/advisories/CVE-2009-4022v6\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126393609503704\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126399602810086\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38219\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/38240\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/40086\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2010/dsa-2054\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:021\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-888-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0622\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1352\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=554851\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=557121\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6815\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7512\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8884\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2010-0062.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.isc.org/advisories/CVE-2009-4022v6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.