ISC BIND 9.0.x, 9.1.x, 9.2.0 up to 9.2.7, 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote malicious users to cause a denial of service (exit) via a type * (ANY) DNS query response that contains multiple RRsets, which triggers an assertion error, aka the "DNSSEC Validation" vulnerability.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
isc bind 9.4.0 |
||
isc bind 9.3.1 |
||
isc bind 9.3.0 |
||
isc bind 9.2.4 |
||
isc bind 9.2.3 |
||
isc bind 9.2.1 |
||
isc bind 9.3.2 |
||
isc bind 9.2.5 |
||
isc bind 9.2.2 |
||
isc bind 9.2.0 |
||
isc bind 9.1.3 |
||
isc bind 9.1.2 |
||
isc bind 9.1.1 |
||
isc bind 9.0.0 |
||
isc bind 9.5.0 |
||
isc bind 9.2.6 |
||
isc bind 9.0.1 |
||
isc bind 9.3 |
||
isc bind 9.2 |
||
isc bind 9.0 |
||
isc bind 9.1.0 |
||
isc bind 9.1 |