Vulnerabilities > ISC > Medium

DATE CVE VULNERABILITY TITLE RISK
2015-02-19 CVE-2015-1349 Resource Management Errors vulnerability in ISC Bind
named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
network
high complexity
isc CWE-399
5.4
2014-12-11 CVE-2014-8680 Improper Input Validation vulnerability in ISC Bind 9.10.0/9.10.1
The GeoIP functionality in ISC BIND 9.10.0 through 9.10.1 allows remote attackers to cause a denial of service (assertion failure and named exit) via vectors related to (1) the lack of GeoIP databases for both IPv4 and IPv6, or (2) IPv6 support with certain options.
network
high complexity
isc CWE-20
5.4
2014-06-13 CVE-2014-3859 Improper Input Validation vulnerability in ISC Bind 9.10.0
libdns in ISC BIND 9.10.0 before P2 does not properly handle EDNS options, which allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a crafted packet, as demonstrated by an attack against named, dig, or delv.
network
low complexity
isc CWE-20
5.0
2014-05-09 CVE-2014-3214 Improper Input Validation vulnerability in ISC Bind 9.10.0
The prefetch implementation in named in ISC BIND 9.10.0, when a recursive nameserver is enabled, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a DNS query that triggers a response with unspecified attributes.
network
low complexity
isc CWE-20
5.0
2013-11-08 CVE-2013-6230 Permissions, Privileges, and Access Controls vulnerability in ISC Bind
The Winsock WSAIoctl API in Microsoft Windows Server 2008, as used in ISC BIND 9.6-ESV before 9.6-ESV-R10-P1, 9.8 before 9.8.6-P1, 9.9 before 9.9.4-P1, 9.9.3-S1, 9.9.4-S1, and other products, does not properly support the SIO_GET_INTERFACE_LIST command for netmask 255.255.255.255, which allows remote attackers to bypass intended IP address restrictions by leveraging misinterpretation of this netmask as a 0.0.0.0 netmask.
network
isc CWE-264
6.8
2013-03-28 CVE-2013-2494 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in ISC Dhcp
libdns in ISC DHCP 4.2.x before 4.2.5-P1 allows remote name servers to cause a denial of service (memory consumption) via vectors involving a regular expression, as demonstrated by a memory-exhaustion attack against a machine running a dhcpd process, a related issue to CVE-2013-2266.
network
high complexity
isc CWE-119
4.9
2012-11-11 CVE-2012-3523 Permissions, Privileges, and Access Controls vulnerability in ISC INN
The STARTTLS implementation in nnrpd in INN before 2.5.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
network
isc CWE-264
6.8
2012-07-25 CVE-2012-3868 Race Condition vulnerability in ISC Bind 9.9.0/9.9.1
Race condition in the ns_client structure management in ISC BIND 9.9.x before 9.9.1-P2 allows remote attackers to cause a denial of service (memory consumption or process exit) via a large volume of TCP queries.
network
isc CWE-362
4.3
2012-07-25 CVE-2012-3571 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products
ISC DHCP 4.1.2 through 4.2.4 and 4.1-ESV before 4.1-ESV-R6 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed client identifier.
low complexity
isc canonical debian CWE-119
6.1
2012-07-25 CVE-2012-3570 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in ISC Dhcp
Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.
5.7