7.1
CVSSv2

CVE-2012-5689

Published: 25/01/2013 Updated: 19/08/2016
CVSS v2 Base Score: 7.1 | Impact Score: 6.9 | Exploitability Score: 8.6
VMScore: 633
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

ISC BIND 9.8.x up to and including 9.8.4-P1 and 9.9.x up to and including 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote malicious users to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record.

Vulnerable Product Search on Vulmon Subscribe to Product

isc bind 9.9.0

isc bind 9.9.1

isc bind 9.9.2

redhat enterprise linux hpc node 6.0

redhat enterprise linux workstation 6.0

redhat enterprise linux server aus 6.4

redhat enterprise linux server eus 6.4.z

redhat enterprise linux server 6.0

redhat enterprise linux desktop 6.0

isc bind 9.8.3

isc bind 9.8.1

isc bind 9.8.0

isc bind 9.8.2

isc bind 9.8.4

canonical ubuntu linux 14.04

canonical ubuntu linux 15.04

canonical ubuntu linux 12.04

Vendor Advisories

Synopsis Moderate: bind security and enhancement update Type/Severity Security Advisory: Moderate Topic Updated bind packages that fix one security issue and add one enhancementare now available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurit ...
Debian Bug report logs - #699145 bind9: CVE-2012-5689 Package: bind9; Maintainer for bind9 is Debian DNS Team <team+dns@trackerdebianorg>; Source for bind9 is src:bind9 (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Mon, 28 Jan 2013 06:42:01 UTC Severity: important Tags: security Fix ...
Bind could be made to crash if it received specially crafted network traffic ...
A flaw was found in the DNS64 implementation in BIND when using Response Policy Zones (RPZ) If a remote attacker sent a specially-crafted query to a named server that is using RPZ rewrite rules, named could exit unexpectedly with an assertion failure Note that DNS64 support is not enabled by default (CVE-2012-5689) ...

Github Repositories

patched dig-9.9.3 that supports edns-subnet

Bind 910 版本官方已经merge了EDNS CLIENT SUBNET功能, 此仓库请勿使用!! Bind-993 --Reverier-patched 本仓库包含已经编译好的打过补丁的bind-993 Usage 在本仓库目录下, 执行 /bin/dig/dig @<DNS Server> <Target Server Domain> +client=<Querier IP address> 即可

patched dig-9.9.3 that supports edns-subnet

Bind 910 版本官方已经merge了EDNS CLIENT SUBNET功能, 此仓库请勿使用!! Bind-993 --Reverier-patched 本仓库包含已经编译好的打过补丁的bind-993 Usage 在本仓库目录下, 执行 /bin/dig/dig @<DNS Server> <Target Server Domain> +client=<Querier IP address> 即可