6.4
CVSSv2

CVE-2010-3614

Published: 06/12/2010 Updated: 10/10/2018
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 572
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

named in ISC BIND 9.x prior to 9.6.2-P3, 9.7.x prior to 9.7.2-P3, 9.4-ESV prior to 9.4-ESV-R4, and 9.6-ESV prior to 9.6-ESV-R3 does not properly determine the security status of an NS RRset during a DNSKEY algorithm rollover, which might allow remote malicious users to cause a denial of service (DNSSEC validation error) by triggering a rollover.

Vulnerable Product Search on Vulmon Subscribe to Product

isc bind 9.7.5

isc bind 9.7.3

isc bind 9.7.2

isc bind 9.7.1

isc bind 9.7.0

isc bind 9.6

isc bind 9.5.2

isc bind 9.5.1

isc bind 9.5.0

isc bind 9.4.3

isc bind 9.4.2

isc bind 9.4.0

isc bind 9.4

isc bind 9.3.5

isc bind 9.3.1

isc bind 9.3.0

isc bind 9.6.2

isc bind 9.6.1

isc bind 9.6.0

isc bind 9.2.5

isc bind 9.2.4

isc bind 9.2.2

isc bind 9.2.0

isc bind 9.1.3

isc bind 9.1.1

isc bind 9.0.1

isc bind 9.0.0

isc bind 9.7.6

isc bind 9.7.4

isc bind 9.5.3

isc bind 9.3.6

isc bind 9.3.2

isc bind 9.2.8

isc bind 9.2.7

isc bind 9.5

isc bind 9.3.4

isc bind 9.3.3

isc bind 9.3

isc bind 9.4.1

isc bind 9.2.9

isc bind 9.2.3

isc bind 9.2.1

isc bind 9.2

isc bind 9.1.0

isc bind 9.1

isc bind 9.1.2

isc bind 9.2.6

isc bind 9.0

Vendor Advisories

It was discovered that Bind would incorrectly allow a ncache entry and a rrsig for the same type A remote attacker could exploit this to cause Bind to crash, resulting in a denial of service (CVE-2010-3613) ...
Several remote vulnerabilities have been discovered in BIND, an implementation of the DNS protocol suite The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-3762 When DNSSEC validation is enabled, BIND does not properly handle certain bad signatures if multiple trust anchors exist for a single zone, whi ...
Debian Bug report logs - #605876 BIND 972-P3 (CVE-2010-3613, CVE-2010-3614 and CVE-2010-3615) Package: bind9; Maintainer for bind9 is Debian DNS Team <team+dns@trackerdebianorg>; Source for bind9 is src:bind9 (PTS, buildd, popcon) Reported by: Hideki Yamane <henrich@debianorjp> Date: Sat, 4 Dec 2010 10:51:01 U ...
Debian Bug report logs - #599515 bind9: CVE-2010-3762 Package: bind9; Maintainer for bind9 is Debian DNS Team <team+dns@trackerdebianorg>; Source for bind9 is src:bind9 (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <muehlenhoff@univentionde> Date: Fri, 8 Oct 2010 10:33:01 UTC Severity: grave Tags: securi ...

References

CWE-20http://www.vupen.com/english/advisories/2010/3103http://www.kb.cert.org/vuls/id/837744http://securitytracker.com/id?1024817http://www.securityfocus.com/bid/45137http://www.isc.org/announcement/guidance-regarding-dec-1st-2010-security-advisorieshttp://www.isc.org/software/bind/advisories/cve-2010-3614http://www.osvdb.org/69559http://www.vupen.com/english/advisories/2010/3102http://secunia.com/advisories/42435http://secunia.com/advisories/42459http://www.ubuntu.com/usn/USN-1025-1http://www.vupen.com/english/advisories/2010/3139http://www.vupen.com/english/advisories/2010/3140http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051910.htmlhttp://www.vupen.com/english/advisories/2010/3138http://secunia.com/advisories/42522http://www.debian.org/security/2010/dsa-2130http://www.redhat.com/support/errata/RHSA-2010-0976.htmlhttp://www.redhat.com/support/errata/RHSA-2010-0975.htmlhttp://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.622190http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051963.htmlhttp://secunia.com/advisories/42671http://www.mandriva.com/security/advisories?name=MDVSA-2010:253http://support.avaya.com/css/P8/documents/100124923http://lists.vmware.com/pipermail/security-announce/2011/000126.htmlhttp://www.vmware.com/security/advisories/VMSA-2011-0004.htmlhttp://www.vupen.com/english/advisories/2011/0606http://support.apple.com/kb/HT5002http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.htmlhttp://www.securityfocus.com/archive/1/516909/100/0/threadedhttps://usn.ubuntu.com/1025-1/https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/837744