CERTA-2012-AVI-405
Vulnerability from certfr_avis

Plusieurs vulnérabilités ont été corrigées dans ISC BIND 9. Elles peuvent être exploitées pour effectuer des attaques par déni de service à distance.

La première vulnérabilité (CVE-2012-3817) concerne les serveurs ayant la validation DNSSEC activée.

La seconde vulnérabilité (CVE-2012-3868) est due à une fuite mémoire pouvant se produire lorsque le serveur est soumis à de nombreuses requêtes TCP entrantes.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ISC BIND ISC BIND 9 versions 9.8.0 à 9.8.3-P1 ;
ISC BIND ISC BIND 9 versions 9.6-ESV-R1 à 9.6-ESV-R7-P1 ;
ISC BIND ISC BIND 9 versions 9.9.0 à 9.9.1-P1.
ISC BIND ISC BIND 9 versions 9.7.1 à 9.7.6-P1 ;

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ISC BIND 9 versions 9.8.0 \u00e0 9.8.3-P1 ;",
      "product": {
        "name": "BIND",
        "vendor": {
          "name": "ISC",
          "scada": false
        }
      }
    },
    {
      "description": "ISC BIND 9 versions 9.6-ESV-R1 \u00e0 9.6-ESV-R7-P1 ;",
      "product": {
        "name": "BIND",
        "vendor": {
          "name": "ISC",
          "scada": false
        }
      }
    },
    {
      "description": "ISC BIND 9 versions 9.9.0 \u00e0 9.9.1-P1.",
      "product": {
        "name": "BIND",
        "vendor": {
          "name": "ISC",
          "scada": false
        }
      }
    },
    {
      "description": "ISC BIND 9 versions 9.7.1 \u00e0 9.7.6-P1 ;",
      "product": {
        "name": "BIND",
        "vendor": {
          "name": "ISC",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2012-3817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3817"
    },
    {
      "name": "CVE-2012-3868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3868"
    }
  ],
  "initial_release_date": "2012-07-26T00:00:00",
  "last_revision_date": "2012-07-26T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 ISC AA-00729 du 24 juillet 2012 :",
      "url": "https://kb.isc.org/article/AA-00729"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 ISC AA-00730 du 24 juillet 2012 :",
      "url": "https://kb.isc.org/article/AA-00730"
    }
  ],
  "reference": "CERTA-2012-AVI-405",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2012-07-26T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans ISC BIND 9. Elles\npeuvent \u00eatre exploit\u00e9es pour effectuer des attaques par d\u00e9ni de service\n\u00e0 distance.\n\nLa premi\u00e8re vuln\u00e9rabilit\u00e9 (CVE-2012-3817) concerne les serveurs ayant la\nvalidation DNSSEC activ\u00e9e.\n\nLa seconde vuln\u00e9rabilit\u00e9 (CVE-2012-3868) est due \u00e0 une fuite m\u00e9moire\npouvant se produire lorsque le serveur est soumis \u00e0 de nombreuses\nrequ\u00eates TCP entrantes.\n",
  "title": "Vuln\u00e9rabilit\u00e9s dans ISC BIND",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletins de s\u00e9curit\u00e9 ISC AA-00729 et AA-00730 du 24 juillet 2012",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…