Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2013-4854

Disclosure Date: July 29, 2013
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • fedoraproject,
  • freebsd,
  • hp,
  • isc,
  • mandriva,
  • novell,
  • opensuse,
  • redhat,
  • slackware,
  • suse

Products

  • bind 9.7.0,
  • bind 9.7.1,
  • bind 9.7.2,
  • bind 9.7.3,
  • bind 9.7.4,
  • bind 9.7.5,
  • bind 9.7.6,
  • bind 9.7.7,
  • bind 9.8.0,
  • bind 9.8.1,
  • bind 9.8.2,
  • bind 9.8.3,
  • bind 9.8.4,
  • bind 9.8.5,
  • bind 9.8.6,
  • bind 9.9.0,
  • bind 9.9.1,
  • bind 9.9.2,
  • bind 9.9.3,
  • business server 1.0,
  • dnsco bind 9.9.3,
  • dnsco bind 9.9.4,
  • enterprise linux 5,
  • enterprise linux 6.0,
  • enterprise server 5.0,
  • fedora 18,
  • fedora 19,
  • freebsd 8.0,
  • freebsd 8.1,
  • freebsd 8.2,
  • freebsd 8.3,
  • freebsd 8.4,
  • freebsd 9.0,
  • freebsd 9.1,
  • freebsd 9.2,
  • hp-ux b.11.31,
  • opensuse 11.4,
  • slackware linux 12.1,
  • slackware linux 12.2,
  • slackware linux 13.0,
  • slackware linux 13.1,
  • slackware linux 13.37,
  • suse linux 11,
  • suse linux enterprise software development kit 11.0

References

Advisory

Additional Info

Technical Analysis