BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Bind | Isc | 4.9.3 (including) | 4.9.3 (including) |
Bind | Isc | 4.9.5 (including) | 4.9.5 (including) |
Bind | Isc | 4.9.5-p1 (including) | 4.9.5-p1 (including) |
Bind | Isc | 4.9.6 (including) | 4.9.6 (including) |
Bind | Isc | 4.9.7 (including) | 4.9.7 (including) |
Bind | Isc | 8.2 (including) | 8.2 (including) |
Bind | Isc | 8.2.1 (including) | 8.2.1 (including) |
Bind | Isc | 8.2.2 (including) | 8.2.2 (including) |
Bind | Isc | 8.2.2-p1 (including) | 8.2.2-p1 (including) |
Bind | Isc | 8.2.2-p2 (including) | 8.2.2-p2 (including) |
Bind | Isc | 8.2.2-p3 (including) | 8.2.2-p3 (including) |
Bind | Isc | 8.2.2-p4 (including) | 8.2.2-p4 (including) |
Bind | Isc | 8.2.2-p5 (including) | 8.2.2-p5 (including) |
Bind | Isc | 8.2.2-p6 (including) | 8.2.2-p6 (including) |
Bind | Isc | 8.2.2-p7 (including) | 8.2.2-p7 (including) |