named in ISC BIND 9.x prior to 9.9.8-P4 and 9.10.x prior to 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote malicious users to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
isc bind 9.10.3 |
||
isc bind 9.9.8 |
||
isc bind |
||
suse linux enterprise server 11 |
||
suse linux enterprise debuginfo 11 |
||
suse openstack cloud 5 |
||
suse manager proxy 2.1 |
||
suse linux enterprise desktop 11 |
||
suse linux enterprise software development kit 12 |
||
suse manager 2.1 |
||
suse linux enterprise server 12 |
||
opensuse opensuse 11.4 |
||
suse linux enterprise software development kit 11 |
||
suse linux enterprise desktop 12 |
||
opensuse leap 42.1 |
||
opensuse opensuse 13.1 |
||
opensuse opensuse 13.2 |
||
fedoraproject fedora 22 |
||
fedoraproject fedora 24 |
||
fedoraproject fedora 23 |
||
canonical ubuntu linux 15.10 |
||
canonical ubuntu linux 14.04 |
||
canonical ubuntu linux 12.04 |
||
debian debian linux 8.0 |
||
debian debian linux 7.0 |
||
debian debian linux 9.0 |
||
juniper junos 12.1x46 |
||
juniper junos 12.1x46-d10 |
||
juniper junos 12.1x46-d76 |
||
juniper junos 12.3x48 |
||
juniper junos 15.1x49 |
||
juniper junos 17.3 |
||
juniper junos 17.4 |
||
juniper junos 18.1 |
||
juniper junos 18.2 |
||
juniper junos 18.3 |
||
juniper junos 18.4 |