Rapid7 Vulnerability & Exploit Database

FreeBSD: BIND -- Remote DOS (FreeBSD-SA-11:06.bind) (CVE-2011-4313)

Back to Search

FreeBSD: BIND -- Remote DOS (FreeBSD-SA-11:06.bind) (CVE-2011-4313)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
11/29/2011
Created
07/25/2018
Added
05/08/2014
Modified
02/21/2017

Description

query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.

Solution(s)

  • freebsd-upgrade-base-7_3-release-p9
  • freebsd-upgrade-base-7_4-release-p5
  • freebsd-upgrade-base-8_1-release-p7
  • freebsd-upgrade-base-8_2-release-p5
  • freebsd-upgrade-package-bind96
  • freebsd-upgrade-package-bind97
  • freebsd-upgrade-package-bind98

References

  • freebsd-upgrade-base-7_3-release-p9
  • freebsd-upgrade-base-7_4-release-p5
  • freebsd-upgrade-base-8_1-release-p7
  • freebsd-upgrade-base-8_2-release-p5
  • freebsd-upgrade-package-bind96
  • freebsd-upgrade-package-bind97
  • freebsd-upgrade-package-bind98

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;