First published: Fri May 27 2011(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2011-1910">CVE-2011-1910</a> to the following vulnerability: A BIND 9 DNS server set up to be a caching resolver is vulnerable to a user querying a domain with very large resource record sets (RRSets) when trying to negatively cache a response. This can cause the BIND 9 DNS server (named process) to crash. <a href="http://www.isc.org/software/bind/advisories/cve-2011-1910">http://www.isc.org/software/bind/advisories/cve-2011-1910</a>
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
BIND 9 | =9.6.2-p2 | |
BIND 9 | =9.6.2-p1 | |
BIND 9 | =9.4.2-p2_w1 | |
BIND 9 | =9.6.1-p2 | |
BIND 9 | =9.2.0-rc7 | |
BIND 9 | =9.1.1-rc6 | |
BIND 9 | =9.3.1-rc1 | |
BIND 9 | =9.5.0-a6 | |
BIND 9 | =9.1.1 | |
BIND 9 | =9.4.3-b1 | |
BIND 9 | =9.5.2-p4 | |
BIND 9 | =9.2.3-rc2 | |
BIND 9 | =9.1.3 | |
BIND 9 | =9.5.1-b2 | |
BIND 9 | =9.7.0-rc2 | |
BIND 9 | =9.4-r4 | |
BIND 9 | =9.4.3-b2 | |
BIND 9 | =9.4-r3 | |
BIND 9 | =9.6.1-rc1 | |
BIND 9 | =9.6-r6_rc1 | |
BIND 9 | =9.1.1-rc1 | |
BIND 9 | =9.7.1-b1 | |
BIND 9 | =9.1.3-rc3 | |
BIND 9 | =9.7.2-rc1 | |
BIND 9 | =9.4-r5 | |
BIND 9 | =9.4.0-b2 | |
BIND 9 | =9.6.2-rc1 | |
BIND 9 | =9.3.5 | |
BIND 9 | =9.2.0-b2 | |
BIND 9 | =9.7.0-b1 | |
BIND 9 | =9.3.2-rc1 | |
BIND 9 | =9.2.0-a3 | |
BIND 9 | =9.7.0-a1 | |
BIND 9 | =9.2.3-rc4 | |
BIND 9 | =9.7.0-rc1 | |
BIND 9 | =9.7.0-p2 | |
BIND 9 | =9.6.1-p3 | |
BIND 9 | =9.5.0-p2_w1 | |
BIND 9 | =9.2.8 | |
BIND 9 | =9.2 | |
BIND 9 | =9.3.0-rc4 | |
BIND 9 | =9.2.4-rc8 | |
BIND 9 | =9.2.1-rc1 | |
BIND 9 | =9.3.0-rc2 | |
BIND 9 | =9.6.2 | |
BIND 9 | =9.0.0-rc2 | |
BIND 9 | =9.5.0-a3 | |
BIND 9 | =9.5 | |
BIND 9 | =9.6.1 | |
BIND 9 | =9.4.0-a4 | |
BIND 9 | =9.6.2-b1 | |
BIND 9 | =9.3 | |
BIND 9 | =9.3.4 | |
BIND 9 | =9.3.0-b2 | |
BIND 9 | =9.5.1-rc2 | |
BIND 9 | =9.1.0-rc1 | |
BIND 9 | =9.7.2 | |
BIND 9 | =9.8.0-a1 | |
BIND 9 | =9.2.7-rc1 | |
BIND 9 | =9.5.2 | |
BIND 9 | =9.0.0-rc1 | |
BIND 9 | =9.6-r3 | |
BIND 9 | =9.4.3-p1 | |
BIND 9 | =9.2.5 | |
BIND 9 | =9.3.2 | |
BIND 9 | =9.4-r5-rc1 | |
BIND 9 | =9.7.2-p2 | |
BIND 9 | =9.1.1-rc5 | |
BIND 9 | =9.6.3 | |
BIND 9 | =9.5.0-rc1 | |
BIND 9 | =9.2.3-rc3 | |
BIND 9 | =9.2.0-rc2 | |
BIND 9 | =9.5.2-b1 | |
BIND 9 | =9.5.0-p1 | |
BIND 9 | =9.2.5-b2 | |
BIND 9 | =9.3.6-rc1 | |
BIND 9 | =9.3.6 | |
BIND 9 | =9.2.2 | |
BIND 9 | =9.4.3-p2 | |
BIND 9 | =9.6.1-p1 | |
BIND 9 | =9.4.1 | |
BIND 9 | =9.6-r6_b1 | |
BIND 9 | =9.5.2-rc1 | |
BIND 9 | =9.4-r2 | |
BIND 9 | =9.2.0-rc9 | |
BIND 9 | =9.4 | |
BIND 9 | =9.4.0-a3 | |
BIND 9 | =9.5.0-a1 | |
BIND 9 | =9.5.0-b1 | |
BIND 9 | =9.0.0-rc3 | |
BIND 9 | =9.7.1 | |
BIND 9 | =9.5.1-b3 | |
BIND 9 | =9.2.2-p2 | |
BIND 9 | =9.6.2-p3 | |
BIND 9 | =9.5.2-p1 | |
BIND 9 | =9.3.3-rc1 | |
BIND 9 | =9.2.4-rc6 | |
BIND 9 | =9.5.0-a7 | |
BIND 9 | =9.7.0-a3 | |
BIND 9 | =9.3.0 | |
BIND 9 | =9.4.0-rc2 | |
BIND 9 | =9.7.1-rc1 | |
BIND 9 | =9.3.0-b3 | |
BIND 9 | =9.4-r5-p1 | |
BIND 9 | =9.3.5-rc2 | |
BIND 9 | =9.7.1-p2 | |
BIND 9 | =9.5.0-a2 | |
BIND 9 | =9.8.0-p1 | |
BIND 9 | =9.4-b1 | |
BIND 9 | =9.6.0-p1 | |
BIND 9 | =9.5.0-a4 | |
BIND 9 | =9.3.3-rc2 | |
BIND 9 | =9.2.4-rc7 | |
BIND 9 | =9.2.7-rc3 | |
BIND 9 | =9.5.0-a5 | |
BIND 9 | =9.1.3-rc2 | |
BIND 9 | =9.7.0 | |
BIND 9 | =9.5.0-p2_w2 | |
BIND 9 | =9.6 | |
BIND 9 | =9.7.0-a2 | |
BIND 9 | =9.6-r6 | |
BIND 9 | =9.4-r5-b1 | |
BIND 9 | =9.2.7 | |
BIND 9 | =9.4 | |
BIND 9 | =9.6-r9_p1 | |
BIND 9 | =9.2.4 | |
BIND 9 | =9.7.0-p1 | |
BIND 9 | =9.2.5-rc1 | |
BIND 9 | =9.6-r5_b1 | |
BIND 9 | =9.6-r2 | |
BIND 9 | =9.2.1 | |
BIND 9 | =9.1.2 | |
BIND 9 | =9.5.0 | |
BIND 9 | =9.6-r9 | |
BIND 9 | =9.1.1-rc4 | |
BIND 9 | =9.4.3-p5 | |
BIND 9 | =9.6-r1 | |
BIND 9 | =9.6-r7_p2 | |
BIND 9 | =9.7.2-p3 | |
BIND 9 | =9.4.2 | |
BIND 9 | =9.4.0-a2 | |
BIND 9 | =9.3.1 | |
BIND 9 | =9.4.3-b3 | |
BIND 9 | =9.2.0-rc4 | |
BIND 9 | =9.1.1-rc3 | |
BIND 9 | =9.1 | |
BIND 9 | =9.6.1-b1 | |
BIND 9 | =9.3.3-rc3 | |
BIND 9 | =9.2.1-rc2 | |
BIND 9 | =9.4.2-rc1 | |
BIND 9 | =9.4.0-b4 | |
BIND 9 | =9.4.0-b3 | |
BIND 9 | =9.2.4-rc2 | |
BIND 9 | =9.6-r6_rc2 | |
BIND 9 | =9.2.2-p3 | |
BIND 9 | =9.6-r7_p1 | |
BIND 9 | =9.6.0-rc2 | |
BIND 9 | =9.2.9-rc1 | |
BIND 9 | =9.2.7-rc2 | |
BIND 9 | =9.4.3 | |
BIND 9 | =9.1.3-rc1 | |
BIND 9 | =9.7.1-p1 | |
BIND 9 | =9.2.2-rc1 | |
BIND 9 | =9.4-r4-p1 | |
BIND 9 | =9.2.0-rc3 | |
BIND 9 | =9.5.2-p2 | |
BIND 9 | =9.6-r5 | |
BIND 9 | =9.5.0-p2 | |
BIND 9 | =9.2.0-rc8 | |
BIND 9 | =9.0.1-rc2 | |
BIND 9 | =9.2.4-rc3 | |
BIND 9 | =9.0.0-rc6 | |
BIND 9 | =9.4.0-a1 | |
BIND 9 | =9.6-r4_p1 | |
BIND 9 | =9.2.0-rc5 | |
BIND 9 | =9.3.5-rc1 | |
BIND 9 | =9.3.0-rc1 | |
BIND 9 | =9.4.0-a5 | |
BIND 9 | =9.3.3 | |
BIND 9 | =9.7.3 | |
BIND 9 | =9.6-r7 | |
BIND 9 | =9.6-r5_p1 | |
BIND 9 | =9.5.0-b3 | |
BIND 9 | =9.4-r1 | |
BIND 9 | =9.8.0-b1 | |
BIND 9 | =9.3.0-b4 | |
BIND 9 | =9.4.0-rc1 | |
BIND 9 | =9.4.0 | |
BIND 9 | =9.5.2-p3 | |
BIND 9 | =9.5.0-b2 | |
BIND 9 | =9.3.0-rc3 | |
BIND 9 | =9.2.3 | |
BIND 9 | =9.4.3-p3 | |
BIND 9 | =9.6.0-rc1 | |
BIND 9 | =9.7.2-p1 | |
BIND 9 | =9.2.0-rc6 | |
BIND 9 | =9.3.5-p2_w1 | |
BIND 9 | =9.2.0-rc10 | |
BIND 9 | =9.2.0 | |
BIND 9 | =9.2.9 | |
BIND 9 | =9.5.1-b1 | |
BIND 9 | =9.4.3-rc1 | |
BIND 9 | =9.0.1 | |
BIND 9 | =9.6.0-a1 | |
BIND 9 | =9.8.0 | |
BIND 9 | =9.4.0-a6 | |
BIND 9 | =9.5.1-rc1 | |
BIND 9 | =9.2.0-a2 | |
BIND 9 | =9.5.3-b1 | |
BIND 9 | =9.1.1-rc2 | |
BIND 9 | =9.5.3-rc1 | |
BIND 9 | =9.6.3-rc1 | |
BIND 9 | =9.4.0-b1 | |
BIND 9 | =9.1.2-rc1 | |
BIND 9 | =9.2.4-rc4 | |
BIND 9 | =9.0.0-rc4 | |
BIND 9 | =9.6.3-b1 | |
BIND 9 | =9.0 | |
BIND 9 | =9.2.3-rc1 | |
BIND 9 | =9.7.3-b1 | |
BIND 9 | =9.4.2-rc2 | |
BIND 9 | =9.2.0-b1 | |
BIND 9 | =9.6-r4 | |
BIND 9 | =9.2.4-rc5 | |
BIND 9 | =9.2.0-rc1 | |
BIND 9 | =9.0.0-rc5 | |
BIND 9 | =9.6.0-b1 | |
BIND 9 | =9.2.6-rc1 | |
BIND 9 | =9.0.1-rc1 | |
BIND 9 | =9.3.1-b2 | |
BIND 9 | =9.7.0-b2 | |
BIND 9 | =9.1.1-rc7 | |
BIND 9 | =9.2.6 | |
BIND 9 | =9.2.0-a1 | |
BIND 9 | =9.5.1 | |
BIND 9 | =9.4.3-p4 | |
BIND 9 | =9.6.0 | |
BIND 9 | =9.7.0-b3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-1910 is classified as high due to its potential to allow remote code execution.
To fix CVE-2011-1910, upgrade your BIND version to 9.7.2 or later, or apply the appropriate patch provided by ISC.
CVE-2011-1910 affects several versions of ISC BIND, including 9.6.1, 9.6.2, and earlier.
It is not safe to continue using affected software until it has been updated or patched to mitigate the vulnerability.
CVE-2011-1910 can be exploited through crafted DNS queries that trigger a denial of service or remote code execution, impacting system availability.