Vulnerability Details : CVE-2010-3613
named in ISC BIND 9.6.2 before 9.6.2-P3, 9.6-ESV before 9.6-ESV-R3, and 9.7.x before 9.7.2-P3 does not properly handle the combination of signed negative responses and corresponding RRSIG records in the cache, which allows remote attackers to cause a denial of service (daemon crash) via a query for cached data.
Vulnerability category: Denial of service
Threat overview for CVE-2010-3613
Top countries where our scanners detected CVE-2010-3613
Top open port discovered on systems with this issue
53
IPs affected by CVE-2010-3613 91
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2010-3613!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2010-3613
Probability of exploitation activity in the next 30 days: 1.38%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 85 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-3613
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST |
CWE ids for CVE-2010-3613
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-3613
-
http://marc.info/?l=bugtraq&m=130270720601677&w=2
'[security bulletin] HPSBUX02655 SSRT100353 rev.1 - HP-UX Running BIND, Remote Denial of Service (DoS' - MARC
-
http://www.vupen.com/english/advisories/2010/3103
Webmail | OVH- OVHVendor Advisory
-
http://www.isc.org/announcement/guidance-regarding-dec-1st-2010-security-advisories
Internet Systems Consortium
-
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051910.html
[SECURITY] Fedora 13 Update: bind-9.7.2-1.P3.fc13
-
http://www.vupen.com/english/advisories/2010/3139
Webmail | OVH- OVHVendor Advisory
-
http://lists.vmware.com/pipermail/security-announce/2011/000126.html
[Security-announce] VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm
-
http://www.debian.org/security/2010/dsa-2130
Debian -- Security Information -- DSA-2130-1 bind9
-
http://www.securityfocus.com/bid/45133
ISC BIND 9 'RRSIG' Record Type Negative Cache Remote Denial of Service Vulnerability
-
http://www.vupen.com/english/advisories/2011/0267
Webmail | OVH- OVH
-
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
Apple - Lists.apple.com
-
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.622190
The Slackware Linux Project: Slackware Security Advisories
-
http://www.securityfocus.com/archive/1/516909/100/0/threaded
SecurityFocus
-
http://www.vupen.com/english/advisories/2010/3102
Webmail | OVH- OVHVendor Advisory
-
http://securitytracker.com/id?1024817
BIND Bugs Let Remote Users Bypass Access Controls and Deny Service - SecurityTracker
-
http://www.redhat.com/support/errata/RHSA-2010-0975.html
Support
-
http://www.vupen.com/english/advisories/2011/0606
Webmail | OVH- OVH
-
http://www.ubuntu.com/usn/USN-1025-1
USN-1025-1: Bind vulnerabilities | Ubuntu security notices
-
http://www.redhat.com/support/errata/RHSA-2010-0976.html
Support
-
http://www.redhat.com/support/errata/RHSA-2010-1000.html
Support
-
http://www.vupen.com/english/advisories/2010/3138
Webmail | OVH- OVHVendor Advisory
-
http://www.isc.org/software/bind/advisories/cve-2010-3613
Internet Systems ConsortiumVendor Advisory
-
http://www.vupen.com/english/advisories/2010/3140
Webmail | OVH- OVHVendor Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051963.html
[SECURITY] Fedora 14 Update: bind-9.7.2-4.P3.fc14
-
http://www.kb.cert.org/vuls/id/706148
VU#706148 - ISC BIND cache vulnerabilityUS Government Resource
-
http://support.avaya.com/css/P8/documents/100124923
ASA-2011-004 (RHSA-2010-0976)
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:253
mandriva.com
-
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2011-001.txt.asc
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12601
Repository / Oval Repository
-
http://www.vmware.com/security/advisories/VMSA-2011-0004.html
VMSA-2011-0004.3
-
http://support.apple.com/kb/HT5002
About the security content of OS X Lion v10.7.2 and Security Update 2011-006 - Apple Support
Products affected by CVE-2010-3613
- cpe:2.3:a:isc:bind:9.6:r2:*:*:esv:*:*:*
- cpe:2.3:a:isc:bind:9.6:r1:*:*:esv:*:*:*
- cpe:2.3:a:isc:bind:9.6:*:*:*:esv:*:*:*
- cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.0:a2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.0:a1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.0:a3:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.0:b3:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.0:b2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.7.1:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.6.2:p2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.6.2:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.6.2:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.6.2:*:*:*:*:*:*:*