CVE-2014-0591

CVSS V2 Low 2.6 CVSS V3 None
Description
The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature.
Overview
  • CVE ID
  • CVE-2014-0591
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2014-01-14T04:29:56
  • Last Modified Date
  • 2018-10-30T16:27:02
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6:r9_p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6.1:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6.1:p2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6.1:p3:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6.1:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6.2:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6.3:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.7.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.5:p2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.6:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.6:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.8.6:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.9.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.9.4:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.9.4:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.9.4:rc2:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:H/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • HIGH
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 2.6
  • Severity
  • LOW
  • Exploitability Score
  • 4.9
  • Impact Score
  • 2.9
References
Reference URL Reference Tags
https://bugzilla.redhat.com/show_bug.cgi?id=1051717
https://kb.isc.org/article/AA-01085 Vendor Advisory
https://kb.isc.org/article/AA-01078 Vendor Advisory
http://secunia.com/advisories/56442
http://osvdb.org/101973
http://secunia.com/advisories/56425
http://www.securitytracker.com/id/1029589
http://secunia.com/advisories/56427
http://www.ubuntu.com/usn/USN-2081-1
http://marc.info/?l=bugtraq&m=138995561732658&w=2
http://lists.fedoraproject.org/pipermail/package-announce/2014-January/126761.html
http://www.securityfocus.com/bid/64801
http://secunia.com/advisories/56493
http://secunia.com/advisories/56574
http://www.mandriva.com/security/advisories?name=MDVSA-2014:002
http://secunia.com/advisories/56522
http://www.freebsd.org/security/advisories/FreeBSD-SA-14:04.bind.asc
http://lists.fedoraproject.org/pipermail/package-announce/2014-January/126772.html
http://rhn.redhat.com/errata/RHSA-2014-0043.html
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.524465
http://lists.opensuse.org/opensuse-updates/2014-02/msg00019.html
http://lists.opensuse.org/opensuse-updates/2014-02/msg00016.html
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.518391
http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
https://support.apple.com/kb/HT6536
http://www.debian.org/security/2014/dsa-3023
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00009.html
http://secunia.com/advisories/61343
http://secunia.com/advisories/61199
http://secunia.com/advisories/61117
http://linux.oracle.com/errata/ELSA-2014-1244
http://secunia.com/advisories/56871
History
Created Old Value New Value Data Type Notes
2022-05-10 17:57:42 Added to TrackCVE
2022-12-01 21:28:51 2014-01-14T04:29Z 2014-01-14T04:29:56 CVE Published Date updated
2022-12-01 21:28:51 2018-10-30T16:27:02 CVE Modified Date updated
2022-12-01 21:28:51 Modified Vulnerability Status updated