5
CVSSv2

CVE-2011-1910

Published: 31/05/2011 Updated: 09/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 447
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Off-by-one error in named in ISC BIND 9.x prior to 9.7.3-P1, 9.8.x prior to 9.8.0-P2, 9.4-ESV prior to 9.4-ESV-R4-P1, and 9.6-ESV prior to 9.6-ESV-R4-P1 allows remote DNS servers to cause a denial of service (assertion failure and daemon exit) via a negative response containing large RRSIG RRsets.

Vulnerable Product Search on Vulmon Subscribe to Product

isc bind 9.8.0

isc bind 9.7.3

isc bind 9.7.1

isc bind 9.7.0

isc bind 9.6.3

isc bind 9.6.1

isc bind 9.6.0

isc bind 9.6

isc bind 9.5.2

isc bind 9.5.1

isc bind 9.5.0

isc bind 9.5

isc bind 9.4.3

isc bind 9.4.2

isc bind 9.4.0

isc bind 9.4

isc bind 9.3.6

isc bind 9.3.3

isc bind 9.3.0

isc bind 9.2.9

isc bind 9.2.6

isc bind 9.2.5

isc bind 9.2.4

isc bind 9.2.3

isc bind 9.2.2

isc bind 9.2.0

isc bind 9.2

isc bind 9.1.3

isc bind 9.1.1

isc bind 9.0.1

isc bind 9.0.0

isc bind 9.7.2

isc bind 9.3.5

isc bind 9.2.1

isc bind 9.1.0

isc bind 9.1

isc bind 9.6.2

isc bind 9.5.3

isc bind 9.3.2

isc bind 9.3.1

isc bind 9.2.8

isc bind 9.2.7

isc bind 9.1.2

isc bind 9.4.1

isc bind 9.3.4

isc bind 9.3

isc bind 9.0

Vendor Advisories

An attacker could send crafted input to Bind and cause it to crash ...
It was discovered that BIND, an implementation of the DNS protocol, does not correctly process certain large RRSIG record sets in DNSSEC responses The resulting assertion failure causes the name server process to crash, making name resolution unavailable (CVE-2011-1910) In addition, this update fixes handling of certain signed/unsigned zone combi ...