ghsa-v7pj-79hf-f778
Vulnerability from github
Published
2022-05-17 00:57
Modified
2022-05-17 00:57
Details
ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
{ "affected": [], "aliases": [ "CVE-2012-5166" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2012-10-10T21:55:00Z", "severity": "HIGH" }, "details": "ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.", "id": "GHSA-v7pj-79hf-f778", "modified": "2022-05-17T00:57:39Z", "published": "2022-05-17T00:57:39Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5166" }, { "type": "WEB", "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_5166_denial_of" }, { "type": "WEB", "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488" }, { "type": "WEB", "url": "https://kb.isc.org/article/AA-00801" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19706" }, { "type": "WEB", "url": "http://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asc" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090346.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090491.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090586.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.html" }, { "type": "WEB", "url": "http://osvdb.org/86118" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1363.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1364.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1365.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/50903" }, { "type": "WEB", "url": "http://secunia.com/advisories/50909" }, { "type": "WEB", "url": "http://secunia.com/advisories/50956" }, { "type": "WEB", "url": "http://secunia.com/advisories/51054" }, { "type": "WEB", "url": "http://secunia.com/advisories/51078" }, { "type": "WEB", "url": "http://secunia.com/advisories/51096" }, { "type": "WEB", "url": "http://secunia.com/advisories/51106" }, { "type": "WEB", "url": "http://secunia.com/advisories/51178" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT5880" }, { "type": "WEB", "url": "http://www.debian.org/security/2012/dsa-2560" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV30185" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV30247" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV30364" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV30365" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV30366" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV30367" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV30368" }, { "type": "WEB", "url": "http://www.isc.org/software/bind/advisories/cve-2012-5166" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:162" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/55852" }, { "type": "WEB", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2012\u0026m=slackware-security.536004" }, { "type": "WEB", "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" } ], "schema_version": "1.4.0", "severity": [] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.