Executive Summary

Informations
NameCVE-2014-0591First vendor Publication2014-01-13
VendorCveLast vendor Modification2018-10-30

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:N/I:N/A:P)
Cvss Base Score2.6Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityHigh
Cvss Expoit Score4.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591

CWE : Common Weakness Enumeration

%idName
100 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:22439
 
Oval ID: oval:org.mitre.oval:def:22439
Title: USN-2081-1 -- bind9 vulnerability
Description: Bind could be made to crash if it received specially crafted network traffic.
Family: unix Class: patch
Reference(s): USN-2081-1
CVE-2014-0591
Version: 5
Platform(s): Ubuntu 13.10
Ubuntu 13.04
Ubuntu 12.10
Ubuntu 12.04
Ubuntu 10.04
Product(s): bind9
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21748
 
Oval ID: oval:org.mitre.oval:def:21748
Title: RHSA-2014:0043: bind security update (Moderate)
Description: The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature.
Family: unix Class: patch
Reference(s): RHSA-2014:0043-00
CESA-2014:0043
CVE-2014-0591
Version: 6
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21969
 
Oval ID: oval:org.mitre.oval:def:21969
Title: HP-UX Running BIND, Remote Denial of Service (DoS)
Description: The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature.
Family: unix Class: vulnerability
Reference(s): CVE-2014-0591
Version: 8
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24134
 
Oval ID: oval:org.mitre.oval:def:24134
Title: ELSA-2014:0043: bind security update (Moderate)
Description: The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature.
Family: unix Class: patch
Reference(s): ELSA-2014:0043-00
CVE-2014-0591
Version: 6
Platform(s): Oracle Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:25596
 
Oval ID: oval:org.mitre.oval:def:25596
Title: SUSE-SU-2014:0179-1 -- Security update for bind
Description: This update fixes a DoS vulnerability in bind when handling malformed NSEC3-signed zones. CVE-2014-0591 has been assigned to this issue.
Family: unix Class: patch
Reference(s): SUSE-SU-2014:0179-1
CVE-2014-0591
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Desktop 11
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26656
 
Oval ID: oval:org.mitre.oval:def:26656
Title: DSA-3023-1 bind9 - security update
Description: Jared Mauch reported a denial of service flaw in the way BIND, a DNS server, handled queries for NSEC3-signed zones. A remote attacker could use this flaw against an authoritative name server that served NCES3-signed zones by sending a specially crafted query, which, when processed, would cause named to crash.
Family: unix Class: patch
Reference(s): DSA-3023-1
CVE-2014-0591
Version: 3
Platform(s): Debian GNU/Linux 7.0
Debian GNU/kFreeBSD 7.0
Product(s): bind9
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26030
 
Oval ID: oval:org.mitre.oval:def:26030
Title: RHSA-2014:1244: bind97 security and bug fix update (Moderate)
Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. It contains a DNS server (named), a resolver library with routines for applications to use when interfacing with DNS, and tools for verifying that the DNS server is operating correctly. These packages contain version 9.7 of the BIND suite. A denial of service flaw was found in the way BIND handled queries for NSEC3-signed zones. A remote attacker could use this flaw against an authoritative name server that served NCES3-signed zones by sending a specially crafted query, which, when processed, would cause named to crash. (CVE-2014-0591) Note: The CVE-2014-0591 issue does not directly affect the version of bind97 shipped in Red Hat Enterprise Linux 5. This issue is being addressed however to assure it is not introduced in future builds of bind97 (possibly built with a different compiler or C library optimization).
Family: unix Class: patch
Reference(s): RHSA-2014:1244-00
CVE-2014-0591
CESA-2014:1244
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): bind97
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27131
 
Oval ID: oval:org.mitre.oval:def:27131
Title: DEPRECATED: ELSA-2014-0043 -- bind security update (moderate)
Description: [32:9.8.2-0.23.rc1.1] - Fix CVE-2014-0591 [32:9.8.2-0.23.rc1] - Fix gssapictx memory leak (#911167) [32:9.8.2-0.22.rc1] - fix CVE-2013-4854 [32:9.8.2-0.21.rc1] - fix CVE-2013-2266 - ship dns/rrl.h in -devel subpkg [32:9.8.2-0.20.rc1] - remove one bogus file from /usr/share/doc, introduced by RRL patch [32:9.8.2-0.19.rc1] - fix CVE-2012-5689 [32:9.8.2-0.18.rc1] - add response rate limit patch (#873624)
Family: unix Class: patch
Reference(s): ELSA-2014-0043
CVE-2014-0591
Version: 5
Platform(s): Oracle Linux 6
Product(s): bind
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application88

Information Assurance Vulnerability Management (IAVM)

DateDescription
2014-06-19IAVM : 2014-A-0086 - Multiple Vulnerabilities in ISC BIND
Severity : Category I - VMSKEY : V0052635

Nessus® Vulnerability Scanner

DateDescription
2017-04-21Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2017-0066.nasl - Type : ACT_GATHER_INFO
2015-03-26Name : The remote Debian host is missing a security update.
File : debian_DLA-48.nasl - Type : ACT_GATHER_INFO
2014-12-26Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2014-0084.nasl - Type : ACT_GATHER_INFO
2014-10-21Name : The remote host is missing a security update for OS X Server.
File : macosx_server_4_0.nasl - Type : ACT_GATHER_INFO
2014-10-14Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20140916_bind97_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2014-10-01Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2014-1244.nasl - Type : ACT_GATHER_INFO
2014-09-18Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2014-1244.nasl - Type : ACT_GATHER_INFO
2014-09-16Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-1244.nasl - Type : ACT_GATHER_INFO
2014-09-12Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3023.nasl - Type : ACT_GATHER_INFO
2014-06-25Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2014-175-01.nasl - Type : ACT_GATHER_INFO
2014-06-13Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-110.nasl - Type : ACT_GATHER_INFO
2014-02-05Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2014-287.nasl - Type : ACT_GATHER_INFO
2014-02-01Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_bind-140127.nasl - Type : ACT_GATHER_INFO
2014-01-30Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201401-34.nasl - Type : ACT_GATHER_INFO
2014-01-29Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2014-028-01.nasl - Type : ACT_GATHER_INFO
2014-01-22Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20140120_bind_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2014-01-21Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2014-0043.nasl - Type : ACT_GATHER_INFO
2014-01-21Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-0043.nasl - Type : ACT_GATHER_INFO
2014-01-21Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2014-0043.nasl - Type : ACT_GATHER_INFO
2014-01-20Name : The remote Fedora host is missing a security update.
File : fedora_2014-0811.nasl - Type : ACT_GATHER_INFO
2014-01-20Name : The remote Fedora host is missing a security update.
File : fedora_2014-0858.nasl - Type : ACT_GATHER_INFO
2014-01-20Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2014-002.nasl - Type : ACT_GATHER_INFO
2014-01-14Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_cb252f017c4311e3b0a6005056a37f68.nasl - Type : ACT_GATHER_INFO
2014-01-14Name : The remote name server may be affected by a denial of service vulnerability.
File : bind9_994_p2.nasl - Type : ACT_GATHER_INFO
2014-01-14Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2081-1.nasl - Type : ACT_GATHER_INFO
2007-06-18Name : The remote host is missing Sun Security Patch number 119783-40
File : solaris10_119783.nasl - Type : ACT_GATHER_INFO
2007-06-18Name : The remote host is missing Sun Security Patch number 119784-40
File : solaris10_x86_119784.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
APPLE http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
BID http://www.securityfocus.com/bid/64801
CONFIRM http://linux.oracle.com/errata/ELSA-2014-1244
https://bugzilla.redhat.com/show_bug.cgi?id=1051717
https://kb.isc.org/article/AA-01078
https://kb.isc.org/article/AA-01085
https://support.apple.com/kb/HT6536
DEBIAN http://www.debian.org/security/2014/dsa-3023
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2014-January/126761...
http://lists.fedoraproject.org/pipermail/package-announce/2014-January/126772...
FREEBSD http://www.freebsd.org/security/advisories/FreeBSD-SA-14:04.bind.asc
HP http://marc.info/?l=bugtraq&m=138995561732658&w=2
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2014:002
REDHAT http://rhn.redhat.com/errata/RHSA-2014-0043.html
SECTRACK http://www.securitytracker.com/id/1029589
SECUNIA http://secunia.com/advisories/56871
http://secunia.com/advisories/61117
http://secunia.com/advisories/61199
http://secunia.com/advisories/61343
SLACKWARE http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&...
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&...
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00009.html
http://lists.opensuse.org/opensuse-updates/2014-02/msg00016.html
http://lists.opensuse.org/opensuse-updates/2014-02/msg00019.html
UBUNTU http://www.ubuntu.com/usn/USN-2081-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
DateInformations
2018-10-31 00:20:36
  • Multiple Updates
2018-01-03 09:21:55
  • Multiple Updates
2017-04-22 13:25:52
  • Multiple Updates
2017-01-07 09:25:19
  • Multiple Updates
2016-06-28 22:32:19
  • Multiple Updates
2016-04-27 00:08:11
  • Multiple Updates
2015-03-27 13:28:05
  • Multiple Updates
2015-03-21 00:25:28
  • Multiple Updates
2015-03-20 00:25:20
  • Multiple Updates
2015-03-18 09:26:26
  • Multiple Updates
2014-12-27 13:25:02
  • Multiple Updates
2014-11-21 21:23:09
  • Multiple Updates
2014-11-19 21:24:12
  • Multiple Updates
2014-11-19 05:33:20
  • Multiple Updates
2014-11-14 13:27:28
  • Multiple Updates
2014-10-24 13:26:13
  • Multiple Updates
2014-10-22 13:25:43
  • Multiple Updates
2014-10-16 13:25:17
  • Multiple Updates
2014-10-02 13:27:13
  • Multiple Updates
2014-09-19 13:27:34
  • Multiple Updates
2014-09-17 13:25:45
  • Multiple Updates
2014-09-13 13:43:04
  • Multiple Updates
2014-07-17 09:22:27
  • Multiple Updates
2014-06-26 13:26:04
  • Multiple Updates
2014-06-20 17:23:23
  • Multiple Updates
2014-06-14 13:36:59
  • Multiple Updates
2014-02-21 13:23:27
  • Multiple Updates
2014-02-17 11:25:04
  • Multiple Updates
2014-02-12 13:23:27
  • Multiple Updates
2014-01-31 13:19:29
  • Multiple Updates
2014-01-30 13:20:59
  • Multiple Updates
2014-01-24 13:19:48
  • Multiple Updates
2014-01-23 21:21:42
  • Multiple Updates
2014-01-17 13:20:41
  • Multiple Updates
2014-01-15 21:22:44
  • Multiple Updates
2014-01-14 13:21:07
  • First insertion