Buffer overflow in named in BIND 4 versions 4.9.10 and earlier, and 8 versions 8.3.3 and earlier, allows remote attackers to execute arbitrary code via a certain DNS server response containing SIG resource records (RR).
Name | Vendor | Start Version | End Version |
---|---|---|---|
Bind | Isc | 4.9.5 (including) | 4.9.5 (including) |
Bind | Isc | 4.9.6 (including) | 4.9.6 (including) |
Bind | Isc | 4.9.7 (including) | 4.9.7 (including) |
Bind | Isc | 4.9.8 (including) | 4.9.8 (including) |
Bind | Isc | 4.9.9 (including) | 4.9.9 (including) |
Bind | Isc | 4.9.10 (including) | 4.9.10 (including) |
Bind | Isc | 8.2 (including) | 8.2 (including) |
Bind | Isc | 8.2.1 (including) | 8.2.1 (including) |
Bind | Isc | 8.2.2 (including) | 8.2.2 (including) |
Bind | Isc | 8.2.3 (including) | 8.2.3 (including) |
Bind | Isc | 8.2.4 (including) | 8.2.4 (including) |
Bind | Isc | 8.2.5 (including) | 8.2.5 (including) |
Bind | Isc | 8.2.6 (including) | 8.2.6 (including) |
Bind | Isc | 8.3.0 (including) | 8.3.0 (including) |
Bind | Isc | 8.3.1 (including) | 8.3.1 (including) |
Bind | Isc | 8.3.2 (including) | 8.3.2 (including) |
Bind | Isc | 8.3.3 (including) | 8.3.3 (including) |