CVE-2011-1910

Source
https://nvd.nist.gov/vuln/detail/CVE-2011-1910
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2011-1910.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2011-1910
Related
Published
2011-05-31T20:55:02Z
Modified
2024-06-30T12:00:03Z
Summary
[none]
Details

Off-by-one error in named in ISC BIND 9.x before 9.7.3-P1, 9.8.x before 9.8.0-P2, 9.4-ESV before 9.4-ESV-R4-P1, and 9.6-ESV before 9.6-ESV-R4-P1 allows remote DNS servers to cause a denial of service (assertion failure and daemon exit) via a negative response containing large RRSIG RRsets.

References

Affected packages

Debian:11 / bind9

Package

Name
bind9
Purl
pkg:deb/debian/bind9?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:9.8.1.dfsg-1

Ecosystem specific

{
    "urgency": "high"
}

Debian:12 / bind9

Package

Name
bind9
Purl
pkg:deb/debian/bind9?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:9.8.1.dfsg-1

Ecosystem specific

{
    "urgency": "high"
}

Debian:13 / bind9

Package

Name
bind9
Purl
pkg:deb/debian/bind9?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:9.8.1.dfsg-1

Ecosystem specific

{
    "urgency": "high"
}