fkie_cve-2013-6230
Vulnerability from fkie_nvd
Published
2013-11-08 04:47
Modified
2025-04-11 00:51
Severity ?
Summary
The Winsock WSAIoctl API in Microsoft Windows Server 2008, as used in ISC BIND 9.6-ESV before 9.6-ESV-R10-P1, 9.8 before 9.8.6-P1, 9.9 before 9.9.4-P1, 9.9.3-S1, 9.9.4-S1, and other products, does not properly support the SIO_GET_INTERFACE_LIST command for netmask 255.255.255.255, which allows remote attackers to bypass intended IP address restrictions by leveraging misinterpretation of this netmask as a 0.0.0.0 netmask.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| isc | bind | 9.6 | |
| isc | bind | 9.6 | |
| isc | bind | 9.6 | |
| isc | bind | 9.6 | |
| isc | bind | 9.6 | |
| isc | bind | 9.6 | |
| isc | bind | 9.6 | |
| isc | bind | 9.6 | |
| isc | bind | 9.8.0 | |
| isc | bind | 9.8.0 | |
| isc | bind | 9.8.0 | |
| isc | bind | 9.8.0 | |
| isc | bind | 9.8.0 | |
| isc | bind | 9.8.0 | |
| isc | bind | 9.8.0 | |
| isc | bind | 9.8.1 | |
| isc | bind | 9.8.1 | |
| isc | bind | 9.8.1 | |
| isc | bind | 9.8.1 | |
| isc | bind | 9.8.1 | |
| isc | bind | 9.8.1 | |
| isc | bind | 9.8.2 | |
| isc | bind | 9.8.2 | |
| isc | bind | 9.8.2 | |
| isc | bind | 9.8.3 | |
| isc | bind | 9.8.3 | |
| isc | bind | 9.8.3 | |
| isc | bind | 9.8.4 | |
| isc | bind | 9.8.5 | |
| isc | bind | 9.8.5 | |
| isc | bind | 9.8.5 | |
| isc | bind | 9.8.5 | |
| isc | bind | 9.8.5 | |
| isc | bind | 9.8.5 | |
| isc | bind | 9.8.5 | |
| isc | bind | 9.8.6 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.1 | |
| isc | bind | 9.9.1 | |
| isc | bind | 9.9.1 | |
| isc | bind | 9.9.2 | |
| isc | bind | 9.9.3 | |
| isc | bind | 9.9.3 | |
| isc | bind | 9.9.3 | |
| isc | bind | 9.9.3 | |
| isc | bind | 9.9.3 | |
| isc | bind | 9.9.3 | |
| isc | bind | 9.9.3 | |
| isc | bind | 9.9.4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "20B4B4DA-5780-4D04-8A2B-371C06A470CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*",
"matchCriteriaId": "9672E9A0-C7F1-48DE-AE5B-977DFD614E61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*",
"matchCriteriaId": "11FBC346-F6B6-40D6-8DA2-345BF20B450C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*",
"matchCriteriaId": "5272F28D-4257-4116-8C66-98EF875BEE63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*",
"matchCriteriaId": "E6BF457D-BDF9-4C0D-98B8-B8AB677BFB33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*",
"matchCriteriaId": "4A9A0380-C0A1-4957-A199-3165F691F0A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:*",
"matchCriteriaId": "51913202-006F-4A5B-AAF0-637AAFA8CE43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.6:r9_p1:*:*:*:*:*:*",
"matchCriteriaId": "F0021DD3-C9DD-462E-9734-11E3C78EAB4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4EBDD71E-6F17-4EB6-899F-E27A93CDFDF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*",
"matchCriteriaId": "811D03B2-96A8-47F9-80BE-54228A4108EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "B3D4393C-1151-49F9-963B-B6FD88E93814",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "25855A5C-302F-4A82-AEC1-8C4C9CB70362",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "03E68ACA-0288-4EE5-9250-54711B2E6670",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "8D717D3D-F4BF-470B-AC2B-D1234A7303EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "66D259B7-4F9E-43B2-BB1D-3B097D3CDB28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4F9DA20E-57EA-49A0-9DB2-E9E0191EC1AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*",
"matchCriteriaId": "FCC604FD-A834-4BA7-B1E2-1FCB6A583204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*",
"matchCriteriaId": "479D3C6C-1FD7-4DBE-A841-4B58400A89F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*",
"matchCriteriaId": "BAF29160-63C2-40D0-BE08-3C8181CD5092",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*",
"matchCriteriaId": "8DAA3942-0979-4D33-BD52-EF7F0403DFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "39D75F93-B6A7-4D25-8147-25F7F867E5B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*",
"matchCriteriaId": "B046CE1D-03E1-462F-9762-9269E59BD554",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "DAC9049D-6284-40F7-9E97-596FEDF9EEDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "10D06B47-911B-4095-ABD2-DDD38E6306F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "59428551-218B-4C32-982F-DCDC894E2954",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*",
"matchCriteriaId": "961E22DC-1467-4A0C-9450-A2E047FCFCFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*",
"matchCriteriaId": "DF77CAF5-A8D6-4479-9C4D-A698D26BDC6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AD318FF1-320B-4311-AF7E-988C023B4938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BDCC8861-0655-4180-A083-1516AC441A3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*",
"matchCriteriaId": "DB2E6ABE-B1CB-4603-AFC8-BB7BE1AD96B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:*",
"matchCriteriaId": "C8FC8393-5812-4032-A458-80C01248B18D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:*",
"matchCriteriaId": "8DEC5C59-44A6-4B48-A84F-22C080CBE5CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.5:p2:*:*:*:*:*:*",
"matchCriteriaId": "99AB2851-72D9-4B8D-8BB0-DD6E1909943B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:*",
"matchCriteriaId": "87BAA6BD-4677-451B-B012-F3FF6C95B369",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0E52B0E7-9392-4B08-906F-C47C5CA41044",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:*",
"matchCriteriaId": "BD8E5645-EAE9-43A5-8845-229C403BF93B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A2B96B87-F18C-41EF-9A37-7D0842433A4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*",
"matchCriteriaId": "AFA1AA14-4D4A-45D0-9573-D53C0FFFFF78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*",
"matchCriteriaId": "F5DE1274-F7A1-4F12-A4F5-1CB1DD5B84E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*",
"matchCriteriaId": "401A7E61-AC3D-417D-97B8-E5E736DC6FCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "C7C37F7D-DD28-4C70-A534-A3F434DF4273",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "B2EC1F99-85C1-4081-A118-790111741246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "85D6C9B7-9D5D-4589-AC83-E6ECB535EBFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "043A5E3F-529B-4A9A-8531-184EE6D1942D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "673057D5-256C-4933-B56F-4BF8848323F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "C2CE371B-E399-4D74-B46C-3606E4BDA53A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A3798A1-134C-4066-A012-10C15F103EAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*",
"matchCriteriaId": "9CA1AEBE-040C-483A-9850-7DA888FF8075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*",
"matchCriteriaId": "B9A33F04-3240-4268-B613-C4876770A30F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "91DA33F1-CA29-4EB1-8F95-8CEA71383BF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2A7BE793-7717-4019-8F50-158C309E48B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*",
"matchCriteriaId": "9BE322FB-CC6F-46BA-861C-74C16D7FC791",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.3:b2:*:*:*:*:*:*",
"matchCriteriaId": "9C322F95-B13A-4495-A87E-9295C0169DE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.3:p1:*:*:*:*:*:*",
"matchCriteriaId": "C267AE8E-A71A-4AE4-BF93-86C43924E477",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.3:p2:*:*:*:*:*:*",
"matchCriteriaId": "71A49952-108B-410C-BBFD-3DCEF5E2C00B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "38A3F698-5E6C-40AC-9DC6-FF7478E0440C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.3:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C7E1293E-82F4-4401-B3AA-7CB73761E163",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.4:b1:*:*:*:*:*:*",
"matchCriteriaId": "D6A3B397-2FC9-4584-AD1A-ED241716B0FB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Winsock WSAIoctl API in Microsoft Windows Server 2008, as used in ISC BIND 9.6-ESV before 9.6-ESV-R10-P1, 9.8 before 9.8.6-P1, 9.9 before 9.9.4-P1, 9.9.3-S1, 9.9.4-S1, and other products, does not properly support the SIO_GET_INTERFACE_LIST command for netmask 255.255.255.255, which allows remote attackers to bypass intended IP address restrictions by leveraging misinterpretation of this netmask as a 0.0.0.0 netmask."
},
{
"lang": "es",
"value": "El API Winsock WSAloctl en Microsoft Windows Server 2008, utilizado en ISC BIND 9.6-ESV (anterior a 9.6-ESV-R10-P1), 9.8 (anterior a 9.8.6-P1), 9.9 (anterior a 9.9.4-P1, 9.9.3-S1, 9.9.4-S1), y otros productos, no soportan apropiadamente el comando SIO_GET_INTERFACE_LIST para la m\u00e1scara de red 255.255.255.255, lo que permite a atacantes remotos sorterar restricciones de direcci\u00f3n IP aprovechando la reinterpretaci\u00f3n de esta m\u00e1scara como 0.0.0.0"
}
],
"id": "CVE-2013-6230",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-11-08T04:47:23.087",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.518391"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.isc.org/article/AA-01062"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.isc.org/article/AA-01063"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.518391"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.isc.org/article/AA-01062"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.isc.org/article/AA-01063"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…