CWE
189
Advisory Published
CVE Published
Updated

CVE-2011-1910

First published: Fri May 27 2011(Updated: )

Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2011-1910">CVE-2011-1910</a> to the following vulnerability: A BIND 9 DNS server set up to be a caching resolver is vulnerable to a user querying a domain with very large resource record sets (RRSets) when trying to negatively cache a response. This can cause the BIND 9 DNS server (named process) to crash. <a href="http://www.isc.org/software/bind/advisories/cve-2011-1910">http://www.isc.org/software/bind/advisories/cve-2011-1910</a>

Credit: cret@cert.org

Affected SoftwareAffected VersionHow to fix
BIND 9=9.6.2-p2
BIND 9=9.6.2-p1
BIND 9=9.4.2-p2_w1
BIND 9=9.6.1-p2
BIND 9=9.2.0-rc7
BIND 9=9.1.1-rc6
BIND 9=9.3.1-rc1
BIND 9=9.5.0-a6
BIND 9=9.1.1
BIND 9=9.4.3-b1
BIND 9=9.5.2-p4
BIND 9=9.2.3-rc2
BIND 9=9.1.3
BIND 9=9.5.1-b2
BIND 9=9.7.0-rc2
BIND 9=9.4-r4
BIND 9=9.4.3-b2
BIND 9=9.4-r3
BIND 9=9.6.1-rc1
BIND 9=9.6-r6_rc1
BIND 9=9.1.1-rc1
BIND 9=9.7.1-b1
BIND 9=9.1.3-rc3
BIND 9=9.7.2-rc1
BIND 9=9.4-r5
BIND 9=9.4.0-b2
BIND 9=9.6.2-rc1
BIND 9=9.3.5
BIND 9=9.2.0-b2
BIND 9=9.7.0-b1
BIND 9=9.3.2-rc1
BIND 9=9.2.0-a3
BIND 9=9.7.0-a1
BIND 9=9.2.3-rc4
BIND 9=9.7.0-rc1
BIND 9=9.7.0-p2
BIND 9=9.6.1-p3
BIND 9=9.5.0-p2_w1
BIND 9=9.2.8
BIND 9=9.2
BIND 9=9.3.0-rc4
BIND 9=9.2.4-rc8
BIND 9=9.2.1-rc1
BIND 9=9.3.0-rc2
BIND 9=9.6.2
BIND 9=9.0.0-rc2
BIND 9=9.5.0-a3
BIND 9=9.5
BIND 9=9.6.1
BIND 9=9.4.0-a4
BIND 9=9.6.2-b1
BIND 9=9.3
BIND 9=9.3.4
BIND 9=9.3.0-b2
BIND 9=9.5.1-rc2
BIND 9=9.1.0-rc1
BIND 9=9.7.2
BIND 9=9.8.0-a1
BIND 9=9.2.7-rc1
BIND 9=9.5.2
BIND 9=9.0.0-rc1
BIND 9=9.6-r3
BIND 9=9.4.3-p1
BIND 9=9.2.5
BIND 9=9.3.2
BIND 9=9.4-r5-rc1
BIND 9=9.7.2-p2
BIND 9=9.1.1-rc5
BIND 9=9.6.3
BIND 9=9.5.0-rc1
BIND 9=9.2.3-rc3
BIND 9=9.2.0-rc2
BIND 9=9.5.2-b1
BIND 9=9.5.0-p1
BIND 9=9.2.5-b2
BIND 9=9.3.6-rc1
BIND 9=9.3.6
BIND 9=9.2.2
BIND 9=9.4.3-p2
BIND 9=9.6.1-p1
BIND 9=9.4.1
BIND 9=9.6-r6_b1
BIND 9=9.5.2-rc1
BIND 9=9.4-r2
BIND 9=9.2.0-rc9
BIND 9=9.4
BIND 9=9.4.0-a3
BIND 9=9.5.0-a1
BIND 9=9.5.0-b1
BIND 9=9.0.0-rc3
BIND 9=9.7.1
BIND 9=9.5.1-b3
BIND 9=9.2.2-p2
BIND 9=9.6.2-p3
BIND 9=9.5.2-p1
BIND 9=9.3.3-rc1
BIND 9=9.2.4-rc6
BIND 9=9.5.0-a7
BIND 9=9.7.0-a3
BIND 9=9.3.0
BIND 9=9.4.0-rc2
BIND 9=9.7.1-rc1
BIND 9=9.3.0-b3
BIND 9=9.4-r5-p1
BIND 9=9.3.5-rc2
BIND 9=9.7.1-p2
BIND 9=9.5.0-a2
BIND 9=9.8.0-p1
BIND 9=9.4-b1
BIND 9=9.6.0-p1
BIND 9=9.5.0-a4
BIND 9=9.3.3-rc2
BIND 9=9.2.4-rc7
BIND 9=9.2.7-rc3
BIND 9=9.5.0-a5
BIND 9=9.1.3-rc2
BIND 9=9.7.0
BIND 9=9.5.0-p2_w2
BIND 9=9.6
BIND 9=9.7.0-a2
BIND 9=9.6-r6
BIND 9=9.4-r5-b1
BIND 9=9.2.7
BIND 9=9.4
BIND 9=9.6-r9_p1
BIND 9=9.2.4
BIND 9=9.7.0-p1
BIND 9=9.2.5-rc1
BIND 9=9.6-r5_b1
BIND 9=9.6-r2
BIND 9=9.2.1
BIND 9=9.1.2
BIND 9=9.5.0
BIND 9=9.6-r9
BIND 9=9.1.1-rc4
BIND 9=9.4.3-p5
BIND 9=9.6-r1
BIND 9=9.6-r7_p2
BIND 9=9.7.2-p3
BIND 9=9.4.2
BIND 9=9.4.0-a2
BIND 9=9.3.1
BIND 9=9.4.3-b3
BIND 9=9.2.0-rc4
BIND 9=9.1.1-rc3
BIND 9=9.1
BIND 9=9.6.1-b1
BIND 9=9.3.3-rc3
BIND 9=9.2.1-rc2
BIND 9=9.4.2-rc1
BIND 9=9.4.0-b4
BIND 9=9.4.0-b3
BIND 9=9.2.4-rc2
BIND 9=9.6-r6_rc2
BIND 9=9.2.2-p3
BIND 9=9.6-r7_p1
BIND 9=9.6.0-rc2
BIND 9=9.2.9-rc1
BIND 9=9.2.7-rc2
BIND 9=9.4.3
BIND 9=9.1.3-rc1
BIND 9=9.7.1-p1
BIND 9=9.2.2-rc1
BIND 9=9.4-r4-p1
BIND 9=9.2.0-rc3
BIND 9=9.5.2-p2
BIND 9=9.6-r5
BIND 9=9.5.0-p2
BIND 9=9.2.0-rc8
BIND 9=9.0.1-rc2
BIND 9=9.2.4-rc3
BIND 9=9.0.0-rc6
BIND 9=9.4.0-a1
BIND 9=9.6-r4_p1
BIND 9=9.2.0-rc5
BIND 9=9.3.5-rc1
BIND 9=9.3.0-rc1
BIND 9=9.4.0-a5
BIND 9=9.3.3
BIND 9=9.7.3
BIND 9=9.6-r7
BIND 9=9.6-r5_p1
BIND 9=9.5.0-b3
BIND 9=9.4-r1
BIND 9=9.8.0-b1
BIND 9=9.3.0-b4
BIND 9=9.4.0-rc1
BIND 9=9.4.0
BIND 9=9.5.2-p3
BIND 9=9.5.0-b2
BIND 9=9.3.0-rc3
BIND 9=9.2.3
BIND 9=9.4.3-p3
BIND 9=9.6.0-rc1
BIND 9=9.7.2-p1
BIND 9=9.2.0-rc6
BIND 9=9.3.5-p2_w1
BIND 9=9.2.0-rc10
BIND 9=9.2.0
BIND 9=9.2.9
BIND 9=9.5.1-b1
BIND 9=9.4.3-rc1
BIND 9=9.0.1
BIND 9=9.6.0-a1
BIND 9=9.8.0
BIND 9=9.4.0-a6
BIND 9=9.5.1-rc1
BIND 9=9.2.0-a2
BIND 9=9.5.3-b1
BIND 9=9.1.1-rc2
BIND 9=9.5.3-rc1
BIND 9=9.6.3-rc1
BIND 9=9.4.0-b1
BIND 9=9.1.2-rc1
BIND 9=9.2.4-rc4
BIND 9=9.0.0-rc4
BIND 9=9.6.3-b1
BIND 9=9.0
BIND 9=9.2.3-rc1
BIND 9=9.7.3-b1
BIND 9=9.4.2-rc2
BIND 9=9.2.0-b1
BIND 9=9.6-r4
BIND 9=9.2.4-rc5
BIND 9=9.2.0-rc1
BIND 9=9.0.0-rc5
BIND 9=9.6.0-b1
BIND 9=9.2.6-rc1
BIND 9=9.0.1-rc1
BIND 9=9.3.1-b2
BIND 9=9.7.0-b2
BIND 9=9.1.1-rc7
BIND 9=9.2.6
BIND 9=9.2.0-a1
BIND 9=9.5.1
BIND 9=9.4.3-p4
BIND 9=9.6.0
BIND 9=9.7.0-b3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2011-1910?

    The severity of CVE-2011-1910 is classified as high due to its potential to allow remote code execution.

  • How do I fix CVE-2011-1910?

    To fix CVE-2011-1910, upgrade your BIND version to 9.7.2 or later, or apply the appropriate patch provided by ISC.

  • What software versions are affected by CVE-2011-1910?

    CVE-2011-1910 affects several versions of ISC BIND, including 9.6.1, 9.6.2, and earlier.

  • Is it safe to continue using software affected by CVE-2011-1910?

    It is not safe to continue using affected software until it has been updated or patched to mitigate the vulnerability.

  • What type of attacks could exploit CVE-2011-1910?

    CVE-2011-1910 can be exploited through crafted DNS queries that trigger a denial of service or remote code execution, impacting system availability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203