CVE-2010-3762
Published: 5 October 2010
ISC BIND before 9.7.2-P2, when DNSSEC validation is enabled, does not properly handle certain bad signatures if multiple trust anchors exist for a single zone, which allows remote attackers to cause a denial of service (daemon crash) via a DNS query.
Notes
Author | Note |
---|---|
mdeslaur | redhat released updates with change 2869 as fixing it. isc.org says this is a minor issue, setting to "low" |
Priority
Status
Package | Release | Status |
---|---|---|
bind9 Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
hardy |
Released
(1:9.4.2.dfsg.P2-2ubuntu0.7)
|
|
jaunty |
Ignored
(end of life)
|
|
karmic |
Ignored
(end of life)
|
|
lucid |
Released
(1:9.7.0.dfsg.P1-1ubuntu0.2)
|
|
maverick |
Not vulnerable
(1:9.7.1.dfsg.P2-2ubuntu0.1)
|
|
natty |
Not vulnerable
(1:9.7.2.dfsg.P3-1~build1)
|
|
upstream |
Needs triage
|
References
- http://ftp.isc.org/isc/bind9/9.7.2-P2/RELEASE-NOTES-BIND-9.7.2-P2.html
- http://www.isc.org/software/bind/advisories/cve-2010-3762
- http://www.isc.org/community/blog/201010/standardizing-severity-security-vulnerabilities
- https://ubuntu.com/security/notices/USN-1139-1
- https://www.cve.org/CVERecord?id=CVE-2010-3762
- NVD
- Launchpad
- Debian