BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Bind | Isc | 4.9.3 (including) | 4.9.3 (including) |
Bind | Isc | 4.9.5 (including) | 4.9.5 (including) |
Bind | Isc | 4.9.5-p1 (including) | 4.9.5-p1 (including) |
Bind | Isc | 4.9.6 (including) | 4.9.6 (including) |
Bind | Isc | 4.9.7 (including) | 4.9.7 (including) |
Bind | Isc | 8.2 (including) | 8.2 (including) |
Bind | Isc | 8.2.1 (including) | 8.2.1 (including) |
Bind | Isc | 8.2.2 (including) | 8.2.2 (including) |
Bind | Isc | 8.2.2-p1 (including) | 8.2.2-p1 (including) |
Bind | Isc | 8.2.2-p2 (including) | 8.2.2-p2 (including) |
Bind | Isc | 8.2.2-p3 (including) | 8.2.2-p3 (including) |
Bind | Isc | 8.2.2-p4 (including) | 8.2.2-p4 (including) |
Bind | Isc | 8.2.2-p5 (including) | 8.2.2-p5 (including) |
Bind | Isc | 8.2.2-p6 (including) | 8.2.2-p6 (including) |
Bind | Isc | 8.2.2-p7 (including) | 8.2.2-p7 (including) |
Red Hat Linux 5.2 | RedHat | * | |
Red Hat Linux 6.2 | RedHat | * | |
Red Hat Linux 7.0 | RedHat | * |