{"vuid":"VU#706148","idnumber":"706148","name":"ISC BIND cache vulnerability","keywords":["isc","bind","cache"],"overview":"The ISC BIND nameserver contains a vulnerability that could allow a remote attacker to cause a denial of service.","clean_desc":"According to ISC: Adding certain types of signed negative responses to cache doesn't clear any matching RRSIG records already in cache. A subsequent lookup of the cached data can cause named to crash (INSIST).","impact":"A remote attacker could cause the name server on an affected system to crash. ISC notes that this vulnerability affects recursive nameservers irrespective of whether DNSSEC validation is enabled or disabled.","resolution":"Apply an update Users who obtain BIND from a third-party vendor, such as their operating system vendor, should see the vendor information portion of this document for a partial list of affected vendors. This vulnerability is addressed in ISC BIND versions 9.4-ESV-R4, 9.6.2-P3, 9.6-ESV-R3, and 9.7.2-P3. Users of BIND from the original source distribution should upgrade to one of these versions, as appropriate. See also https://www.isc.org/software/bind/advisories/cve-2010-3613","workarounds":"","sysaffected":"","thanks":"Thanks to Internet Systems Consortium for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":["https://www.isc.org/software/bind/advisories/cve-2010-3613","http://www.isc.org/announcement/guidance-regarding-dec-1st-2010-security-advisories"],"cveids":["CVE-2010-3613"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2010-11-03T14:56:05Z","publicdate":"2010-12-01T00:00:00Z","datefirstpublished":"2010-12-01T21:33:42Z","dateupdated":"2010-12-16T14:02:33Z","revision":23,"vrda_d1_directreport":"1","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"19","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"5","cam_attackeraccessrequired":"20","cam_scorecurrent":"7.65","cam_scorecurrentwidelyknown":"8.775","cam_scorecurrentwidelyknownexploited":"13.275","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.65,"vulnote":null}