First published: Tue Dec 02 2003(Updated: )
ISC BIND 8.3.x before 8.3.7, and 8.4.x before 8.4.3, allows remote attackers to poison the cache via a malicious name server that returns negative responses with a large TTL (time-to-live) value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC BIND | =8.4.1 | |
ISC BIND | =8.2.5 | |
ISC BIND | =8.3.1 | |
ISC BIND | =8.3.2 | |
Nixu NameSurfer | =suite_3.0.1 | |
ISC BIND | =8.3.4 | |
ISC BIND | =8.2.7 | |
ISC BIND | =8.2.4 | |
ISC BIND | =8.2.6 | |
ISC BIND | =8.2.3 | |
ISC BIND | =8.3.3 | |
ISC BIND | =8.3.5 | |
ISC BIND | =8.3.0 | |
Nixu NameSurfer | =standard_3.0.1 | |
ISC BIND | =8.3.6 | |
ISC BIND | =8.4 | |
NetBSD NetBSD | =1.6 | |
HPE HP-UX | =11.11 | |
Compaq Tru64 | =5.1_pk3_bl17 | |
Compaq Tru64 | =5.1_pk4_bl18 | |
NetBSD NetBSD | =current | |
NetBSD NetBSD | =1.6.1 | |
Compaq Tru64 | =5.1b_pk1_bl1 | |
Sun SunOS | =5.7 | |
Compaq Tru64 | =4.0f_pk6_bl17 | |
Compaq Tru64 | =5.1a_pk3_bl3 | |
Compaq Tru64 | =5.1a_pk4_bl21 | |
Oracle Solaris SPARC | =9.0 | |
Oracle Solaris SPARC | =9.0 | |
Compaq Tru64 | =4.0f | |
Compaq Tru64 | =5.1_pk5_bl19 | |
FreeBSD FreeBSD | =4.7 | |
FreeBSD FreeBSD | =4.8 | |
Xinuos UnixWare | =7.1.1 | |
Compaq Tru64 | =4.0g | |
Compaq Tru64 | =4.0g_pk3_bl17 | |
FreeBSD FreeBSD | =4.4 | |
FreeBSD FreeBSD | =4.5 | |
Sun SunOS | =5.8 | |
Compaq Tru64 | =4.0f_pk8_bl22 | |
Compaq Tru64 | =5.1_pk6_bl20 | |
HPE HP-UX | =11.00 | |
Oracle Solaris SPARC | =7.0 | |
Compaq Tru64 | =5.1 | |
FreeBSD FreeBSD | =4.6 | |
FreeBSD FreeBSD | =4.6.2 | |
Compaq Tru64 | =5.1a_pk5_bl23 | |
Compaq Tru64 | =5.1b | |
Compaq Tru64 | =4.0g_pk4_bl22 | |
Compaq Tru64 | =5.1a_pk1_bl1 | |
Compaq Tru64 | =5.1a_pk2_bl2 | |
IBM AIX | =5.1l | |
Oracle Solaris SPARC | =8.0 | |
Compaq Tru64 | =4.0f_pk7_bl18 | |
Compaq Tru64 | =5.1a | |
Compaq Tru64 | =5.1b_pk2_bl22 | |
FreeBSD FreeBSD | =4.9 | |
FreeBSD FreeBSD | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2003-0914 is considered high due to its potential for remote cache poisoning attacks.
To fix CVE-2003-0914, upgrade to ISC BIND version 8.3.7 or higher, or 8.4.3 or higher.
CVE-2003-0914 affects various versions of ISC BIND 8.3.x and 8.4.x prior to their respective patched versions.
CVE-2003-0914 facilitates remote cache poisoning attacks through malicious name server responses.
CVE-2003-0914 was disclosed in November 2003.