First published: Wed Apr 08 1998(Updated: )
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Data General DG/UX | =5.4_3.0 | |
Data General DG/UX | =5.4_3.1 | |
Data General DG/UX | =5.4_4.1 | |
Data General DG/UX | =5.4_4.11 | |
BIND 9 | =4.9.6 | |
BIND 9 | =8.1 | |
BIND 9 | =8.1.1 | |
SGI IRIX | =3.2 | |
SGI IRIX | =3.3 | |
SGI IRIX | =3.3.1 | |
SGI IRIX | =3.3.2 | |
SGI IRIX | =3.3.3 | |
SGI IRIX | =4.0 | |
SGI IRIX | =4.0.1 | |
SGI IRIX | =4.0.1t | |
SGI IRIX | =4.0.2 | |
SGI IRIX | =4.0.3 | |
SGI IRIX | =4.0.4 | |
SGI IRIX | =4.0.4b | |
SGI IRIX | =4.0.4t | |
SGI IRIX | =4.0.5 | |
SGI IRIX | =4.0.5_iop | |
SGI IRIX | =4.0.5_ipr | |
SGI IRIX | =4.0.5a | |
SGI IRIX | =4.0.5d | |
SGI IRIX | =4.0.5e | |
SGI IRIX | =4.0.5f | |
SGI IRIX | =4.0.5g | |
SGI IRIX | =4.0.5h | |
SGI IRIX | =5.0 | |
SGI IRIX | =5.0.1 | |
SGI IRIX | =5.1 | |
SGI IRIX | =5.1.1 | |
SGI IRIX | =5.2 | |
SGI IRIX | =5.3 | |
SGI IRIX | =6.0 | |
SGI IRIX | =6.1 | |
SGI IRIX | =6.2 | |
SGI IRIX | =6.3 | |
bsdi bsd os | =2.0 | |
bsdi bsd os | =2.0.1 | |
bsdi bsd os | =2.1 | |
SCO OpenLinux Server | =1.0 | |
IBM AIX | =4.1 | |
IBM AIX | =4.1.1 | |
IBM AIX | =4.1.2 | |
IBM AIX | =4.1.3 | |
IBM AIX | =4.1.4 | |
IBM AIX | =4.1.5 | |
IBM AIX | =4.2 | |
IBM AIX | =4.2.1 | |
IBM AIX | =4.3 | |
NEC ASL UX 4800 | =64 | |
NetBSD NetBSD | =1.0 | |
NetBSD NetBSD | =1.1 | |
NetBSD NetBSD | =1.2 | |
NetBSD NetBSD | =1.2.1 | |
NetBSD NetBSD | =1.3 | |
NetBSD NetBSD | =1.3.1 | |
Red Hat Linux | =4.0 | |
Red Hat Linux | =4.1 | |
Red Hat Linux | =4.2 | |
Red Hat Linux | =5.0 | |
SCO Open Desktop | =3.0 | |
SCO Open Desktop | =5.0 | |
Xinuos UnixWare | =2.1 | |
Xinuos UnixWare | =7.0 | |
Oracle Solaris SPARC | =2.5 | |
Oracle Solaris SPARC | =2.5.1 | |
Oracle Solaris SPARC | =2.5.1 | |
Oracle Solaris SPARC | =2.6 | |
Sun SunOS | ||
Sun SunOS | =5.3 | |
Sun SunOS | =5.4 | |
Sun SunOS | =5.5 | |
Sun SunOS | =5.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0009 is classified as a high-severity vulnerability due to the potential for remote exploitation and denial of service.
To fix CVE-1999-0009, users should upgrade to a patched version of BIND that is no longer vulnerable.
CVE-1999-0009 affects BIND versions 4.9 and 8.1, among others listed in the vulnerability details.
Yes, CVE-1999-0009 can lead to system compromise through buffer overflow, allowing an attacker to execute arbitrary code.
A potential workaround for CVE-1999-0009 is to restrict access to affected DNS services from untrusted networks.