BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Bind | Isc | 4.9.3 (including) | 4.9.3 (including) |
| Bind | Isc | 4.9.5 (including) | 4.9.5 (including) |
| Bind | Isc | 4.9.5-p1 (including) | 4.9.5-p1 (including) |
| Bind | Isc | 4.9.6 (including) | 4.9.6 (including) |
| Bind | Isc | 4.9.7 (including) | 4.9.7 (including) |
| Bind | Isc | 8.2 (including) | 8.2 (including) |
| Bind | Isc | 8.2.1 (including) | 8.2.1 (including) |
| Bind | Isc | 8.2.2 (including) | 8.2.2 (including) |
| Bind | Isc | 8.2.2-p1 (including) | 8.2.2-p1 (including) |
| Bind | Isc | 8.2.2-p2 (including) | 8.2.2-p2 (including) |
| Bind | Isc | 8.2.2-p3 (including) | 8.2.2-p3 (including) |
| Bind | Isc | 8.2.2-p4 (including) | 8.2.2-p4 (including) |
| Bind | Isc | 8.2.2-p5 (including) | 8.2.2-p5 (including) |
| Bind | Isc | 8.2.2-p6 (including) | 8.2.2-p6 (including) |
| Bind | Isc | 8.2.2-p7 (including) | 8.2.2-p7 (including) |
| Red Hat Linux 5.2 | RedHat | * | |
| Red Hat Linux 6.2 | RedHat | * | |
| Red Hat Linux 7.0 | RedHat | * |