CVE-2012-5166

ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
References
Link Resource
http://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asc
http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090346.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090491.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090586.html
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.html
http://osvdb.org/86118
http://rhn.redhat.com/errata/RHSA-2012-1363.html
http://rhn.redhat.com/errata/RHSA-2012-1364.html
http://rhn.redhat.com/errata/RHSA-2012-1365.html
http://secunia.com/advisories/50903
http://secunia.com/advisories/50909
http://secunia.com/advisories/50956
http://secunia.com/advisories/51054
http://secunia.com/advisories/51078
http://secunia.com/advisories/51096
http://secunia.com/advisories/51106
http://secunia.com/advisories/51178
http://support.apple.com/kb/HT5880
http://www.debian.org/security/2012/dsa-2560
http://www.ibm.com/support/docview.wss?uid=isg1IV30185
http://www.ibm.com/support/docview.wss?uid=isg1IV30247
http://www.ibm.com/support/docview.wss?uid=isg1IV30364
http://www.ibm.com/support/docview.wss?uid=isg1IV30365
http://www.ibm.com/support/docview.wss?uid=isg1IV30366
http://www.ibm.com/support/docview.wss?uid=isg1IV30367
http://www.ibm.com/support/docview.wss?uid=isg1IV30368
http://www.isc.org/software/bind/advisories/cve-2012-5166
http://www.mandriva.com/security/advisories?name=MDVSA-2012:162
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/55852
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
https://blogs.oracle.com/sunsecurity/entry/cve_2012_5166_denial_of
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
https://kb.isc.org/article/AA-00801 Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19706
http://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asc
http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090346.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090491.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090586.html
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.html
http://osvdb.org/86118
http://rhn.redhat.com/errata/RHSA-2012-1363.html
http://rhn.redhat.com/errata/RHSA-2012-1364.html
http://rhn.redhat.com/errata/RHSA-2012-1365.html
http://secunia.com/advisories/50903
http://secunia.com/advisories/50909
http://secunia.com/advisories/50956
http://secunia.com/advisories/51054
http://secunia.com/advisories/51078
http://secunia.com/advisories/51096
http://secunia.com/advisories/51106
http://secunia.com/advisories/51178
http://support.apple.com/kb/HT5880
http://www.debian.org/security/2012/dsa-2560
http://www.ibm.com/support/docview.wss?uid=isg1IV30185
http://www.ibm.com/support/docview.wss?uid=isg1IV30247
http://www.ibm.com/support/docview.wss?uid=isg1IV30364
http://www.ibm.com/support/docview.wss?uid=isg1IV30365
http://www.ibm.com/support/docview.wss?uid=isg1IV30366
http://www.ibm.com/support/docview.wss?uid=isg1IV30367
http://www.ibm.com/support/docview.wss?uid=isg1IV30368
http://www.isc.org/software/bind/advisories/cve-2012-5166
http://www.mandriva.com/security/advisories?name=MDVSA-2012:162
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/55852
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
https://blogs.oracle.com/sunsecurity/entry/cve_2012_5166_denial_of
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
https://kb.isc.org/article/AA-00801 Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19706
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.0.0:rc4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.0.0:rc5:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.0.0:rc6:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.0.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.0.1:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.1:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.1:rc3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.1:rc4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.1:rc5:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.1:rc6:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.1:rc7:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.3:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.3:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.3:rc3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:a1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:a2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:a3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:rc10:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:rc3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:rc4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:rc5:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:rc6:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:rc7:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:rc8:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:rc9:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.1:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.2:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.2:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.3:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.3:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.3:rc3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.3:rc4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.4:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.4:rc3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.4:rc4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.4:rc5:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.4:rc6:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.4:rc7:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.4:rc8:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.5:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.5:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.6:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.7:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.7:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.7:rc3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.8:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.9:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.0:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.0:b3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.0:b4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.0:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.0:rc3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.0:rc4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.1:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.2:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.3:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.3:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.3:rc3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.5:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.5:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.6:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.6:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4:*:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.4:b1:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.4:r1:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.4:r2:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.4:r3:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.4:r4:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.4:r4-p1:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.4:r5:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.4:r5-b1:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.4:r5-p1:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.4:r5-rc1:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.0:a1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.0:a2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.0:a3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.0:a4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.0:a5:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.0:a6:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.0:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.0:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.0:b3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.0:b4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.0:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.2:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.2:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.3:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.3:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.3:b3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.3:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.3:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.3:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.3:p4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.3:p5:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:a1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:a2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:a3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:a4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:a5:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:a6:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:a7:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:b3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:p2_w1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:p2_w2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.1:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.1:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.1:b3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.2:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.2:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.2:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.2:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.2:p4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.3:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6:*:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.6:r1:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.6:r2:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.6:r3:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.6:r4:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.6:r4_p1:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.6:r5:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.6:r5_b1:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.6:r6:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.6:r7:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:esv:*:*:*
cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.0:a1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.0:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.1:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.1:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.1:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.1:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.2:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.2:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.2:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.2:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.2:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.3:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.3:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:a1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:a2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:a3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:b3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.1:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.6:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.3:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.1:p3:*:*:*:*:*:*

History

21 Nov 2024, 01:44

Type Values Removed Values Added
References () http://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asc - () http://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asc -
References () http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html - () http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090346.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090346.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090491.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090491.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090586.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090586.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.html - () http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.html - () http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.html -
References () http://osvdb.org/86118 - () http://osvdb.org/86118 -
References () http://rhn.redhat.com/errata/RHSA-2012-1363.html - () http://rhn.redhat.com/errata/RHSA-2012-1363.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1364.html - () http://rhn.redhat.com/errata/RHSA-2012-1364.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1365.html - () http://rhn.redhat.com/errata/RHSA-2012-1365.html -
References () http://secunia.com/advisories/50903 - () http://secunia.com/advisories/50903 -
References () http://secunia.com/advisories/50909 - () http://secunia.com/advisories/50909 -
References () http://secunia.com/advisories/50956 - () http://secunia.com/advisories/50956 -
References () http://secunia.com/advisories/51054 - () http://secunia.com/advisories/51054 -
References () http://secunia.com/advisories/51078 - () http://secunia.com/advisories/51078 -
References () http://secunia.com/advisories/51096 - () http://secunia.com/advisories/51096 -
References () http://secunia.com/advisories/51106 - () http://secunia.com/advisories/51106 -
References () http://secunia.com/advisories/51178 - () http://secunia.com/advisories/51178 -
References () http://support.apple.com/kb/HT5880 - () http://support.apple.com/kb/HT5880 -
References () http://www.debian.org/security/2012/dsa-2560 - () http://www.debian.org/security/2012/dsa-2560 -
References () http://www.ibm.com/support/docview.wss?uid=isg1IV30185 - () http://www.ibm.com/support/docview.wss?uid=isg1IV30185 -
References () http://www.ibm.com/support/docview.wss?uid=isg1IV30247 - () http://www.ibm.com/support/docview.wss?uid=isg1IV30247 -
References () http://www.ibm.com/support/docview.wss?uid=isg1IV30364 - () http://www.ibm.com/support/docview.wss?uid=isg1IV30364 -
References () http://www.ibm.com/support/docview.wss?uid=isg1IV30365 - () http://www.ibm.com/support/docview.wss?uid=isg1IV30365 -
References () http://www.ibm.com/support/docview.wss?uid=isg1IV30366 - () http://www.ibm.com/support/docview.wss?uid=isg1IV30366 -
References () http://www.ibm.com/support/docview.wss?uid=isg1IV30367 - () http://www.ibm.com/support/docview.wss?uid=isg1IV30367 -
References () http://www.ibm.com/support/docview.wss?uid=isg1IV30368 - () http://www.ibm.com/support/docview.wss?uid=isg1IV30368 -
References () http://www.isc.org/software/bind/advisories/cve-2012-5166 - () http://www.isc.org/software/bind/advisories/cve-2012-5166 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2012:162 - () http://www.mandriva.com/security/advisories?name=MDVSA-2012:162 -
References () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -
References () http://www.securityfocus.com/bid/55852 - () http://www.securityfocus.com/bid/55852 -
References () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004 - () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004 -
References () http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf - () http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf -
References () https://blogs.oracle.com/sunsecurity/entry/cve_2012_5166_denial_of - () https://blogs.oracle.com/sunsecurity/entry/cve_2012_5166_denial_of -
References () https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488 - () https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488 -
References () https://kb.isc.org/article/AA-00801 - Vendor Advisory () https://kb.isc.org/article/AA-00801 - Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19706 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19706 -

Information

Published : 2012-10-10 21:55

Updated : 2024-11-21 01:44


NVD link : CVE-2012-5166

Mitre link : CVE-2012-5166

CVE.ORG link : CVE-2012-5166


JSON object : View

Products Affected

isc

  • bind
CWE
CWE-189

Numeric Errors