First published: Thu Dec 06 2012(Updated: )
ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BIND 9 | =9.8.0 | |
BIND 9 | =9.8.0-a1 | |
BIND 9 | =9.8.0-b1 | |
BIND 9 | =9.8.0-p1 | |
BIND 9 | =9.8.0-p2 | |
BIND 9 | =9.8.0-p4 | |
BIND 9 | =9.8.0-rc1 | |
BIND 9 | =9.8.1 | |
BIND 9 | =9.8.1-b1 | |
BIND 9 | =9.8.1-b2 | |
BIND 9 | =9.8.1-b3 | |
BIND 9 | =9.8.1-p1 | |
BIND 9 | =9.8.1-rc1 | |
BIND 9 | =9.8.2 | |
BIND 9 | =9.8.2-b1 | |
BIND 9 | =9.8.2-rc1 | |
BIND 9 | =9.8.2-rc2 | |
BIND 9 | =9.8.3 | |
BIND 9 | =9.8.3-p1 | |
BIND 9 | =9.8.3-p2 | |
BIND 9 | =9.8.3-p3 | |
BIND 9 | =9.8.3-p4 | |
BIND 9 | =9.9.0 | |
BIND 9 | =9.9.0-a1 | |
BIND 9 | =9.9.0-a2 | |
BIND 9 | =9.9.0-a3 | |
BIND 9 | =9.9.0-b1 | |
BIND 9 | =9.9.0-b2 | |
BIND 9 | =9.9.0-rc1 | |
BIND 9 | =9.9.0-rc2 | |
BIND 9 | =9.9.0-rc3 | |
BIND 9 | =9.9.0-rc4 | |
BIND 9 | =9.9.1 | |
BIND 9 | =9.9.1-p1 | |
BIND 9 | =9.9.1-p2 | |
BIND 9 | =9.9.1-p3 | |
BIND 9 | =9.9.1-p4 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5688 is classified as a high-severity vulnerability capable of causing denial of service due to remote exploitation.
To fix CVE-2012-5688, upgrade to BIND version 9.8.4-P1 or 9.9.2-P1 or later.
CVE-2012-5688 enables remote attackers to perform denial of service attacks against DNS servers.
CVE-2012-5688 affects BIND versions 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1.
Yes, CVE-2012-5688 occurs when DNS64 functionality is enabled in affected versions of BIND.