← Back to CVEs
CVE-2012-4244
N/ADescription
ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.
CVE Details
CVSS v3.1 ScoreN/A
Published9/14/2012
Last Modified4/29/2026
Sourcenvd
Honeypot Sightings0
Affected Products
isc:bind
References
http://marc.info/?l=bugtraq&m=141879471518471&w=2(cve@mitre.org)
http://rhn.redhat.com/errata/RHSA-2012-1266.html(cve@mitre.org)
http://rhn.redhat.com/errata/RHSA-2012-1267.html(cve@mitre.org)
http://rhn.redhat.com/errata/RHSA-2012-1268.html(cve@mitre.org)
http://rhn.redhat.com/errata/RHSA-2012-1365.html(cve@mitre.org)
http://secunia.com/advisories/50560(cve@mitre.org)
http://secunia.com/advisories/50579(cve@mitre.org)
http://secunia.com/advisories/50582(cve@mitre.org)
http://secunia.com/advisories/50645(cve@mitre.org)
http://secunia.com/advisories/50673(cve@mitre.org)
http://secunia.com/advisories/51096(cve@mitre.org)
http://support.apple.com/kb/HT5880(cve@mitre.org)
http://www.debian.org/security/2012/dsa-2547(cve@mitre.org)
http://www.securityfocus.com/bid/55522(cve@mitre.org)
http://www.ubuntu.com/usn/USN-1566-1(cve@mitre.org)
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488(cve@mitre.org)
https://kb.isc.org/article/AA-00778(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20221209-0008/(cve@mitre.org)
http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087697.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087703.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088381.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00021.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00022.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00007.html(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141879471518471&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2012-1266.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2012-1267.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2012-1268.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2012-1365.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/50560(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/50579(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/50582(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/50645(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/50673(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/51096(af854a3a-2127-422b-91ae-364da2661108)
http://support.apple.com/kb/HT5880(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2012/dsa-2547(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2012:152(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/55522(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1566-1(af854a3a-2127-422b-91ae-364da2661108)
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488(af854a3a-2127-422b-91ae-364da2661108)
https://kb.isc.org/article/AA-00778(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20221209-0008/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.