CVE-2013-4854
Summary
| CVE | CVE-2013-4854 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2013-07-29 13:59:37 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013. |
Risk And Classification
Primary CVSS: v2.0 7.8 from [email protected]
AV:N/AC:L/Au:N/C:N/I:N/A:C
Problem Types: NVD-CWE-noinfo | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
NoneIntegrity
NoneAvailability
CompleteAV:N/AC:L/Au:N/C:N/I:N/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Fedoraproject | Fedora | 18 | All | All | All |
| Operating System | Fedoraproject | Fedora | 19 | All | All | All |
| Operating System | Freebsd | Freebsd | 8.0 | All | All | All |
| Operating System | Freebsd | Freebsd | 8.1 | All | All | All |
| Operating System | Freebsd | Freebsd | 8.2 | All | All | All |
| Operating System | Freebsd | Freebsd | 8.3 | All | All | All |
| Operating System | Freebsd | Freebsd | 8.4 | All | All | All |
| Operating System | Freebsd | Freebsd | 9.0 | All | All | All |
| Operating System | Freebsd | Freebsd | 9.1 | All | All | All |
| Operating System | Freebsd | Freebsd | 9.1 | p4 | All | All |
| Operating System | Freebsd | Freebsd | 9.1 | p5 | All | All |
| Operating System | Freebsd | Freebsd | 9.2 | prerelease | All | All |
| Operating System | Freebsd | Freebsd | 9.2 | rc1 | All | All |
| Operating System | Freebsd | Freebsd | 9.2 | rc2 | All | All |
| Operating System | Hp | Hp-ux | b.11.31 | All | All | All |
| Application | Isc | Bind | 9.7.0 | All | All | All |
| Application | Isc | Bind | 9.7.0 | b1 | All | All |
| Application | Isc | Bind | 9.7.0 | p1 | All | All |
| Application | Isc | Bind | 9.7.0 | p2 | All | All |
| Application | Isc | Bind | 9.7.0 | rc1 | All | All |
| Application | Isc | Bind | 9.7.0 | rc2 | All | All |
| Application | Isc | Bind | 9.7.1 | All | All | All |
| Application | Isc | Bind | 9.7.1 | p1 | All | All |
| Application | Isc | Bind | 9.7.1 | p2 | All | All |
| Application | Isc | Bind | 9.7.1 | rc1 | All | All |
| Application | Isc | Bind | 9.7.2 | All | All | All |
| Application | Isc | Bind | 9.7.2 | p1 | All | All |
| Application | Isc | Bind | 9.7.2 | p2 | All | All |
| Application | Isc | Bind | 9.7.2 | p3 | All | All |
| Application | Isc | Bind | 9.7.2 | rc1 | All | All |
| Application | Isc | Bind | 9.7.3 | All | All | All |
| Application | Isc | Bind | 9.7.3 | b1 | All | All |
| Application | Isc | Bind | 9.7.3 | p1 | All | All |
| Application | Isc | Bind | 9.7.3 | rc1 | All | All |
| Application | Isc | Bind | 9.7.4 | All | All | All |
| Application | Isc | Bind | 9.7.4 | b1 | All | All |
| Application | Isc | Bind | 9.7.4 | p1 | All | All |
| Application | Isc | Bind | 9.7.4 | rc1 | All | All |
| Application | Isc | Bind | 9.7.5 | All | All | All |
| Application | Isc | Bind | 9.7.5 | b1 | All | All |
| Application | Isc | Bind | 9.7.5 | rc1 | All | All |
| Application | Isc | Bind | 9.7.5 | rc2 | All | All |
| Application | Isc | Bind | 9.7.6 | All | All | All |
| Application | Isc | Bind | 9.7.6 | p1 | All | All |
| Application | Isc | Bind | 9.7.6 | p2 | All | All |
| Application | Isc | Bind | 9.7.7 | All | All | All |
| Application | Isc | Bind | 9.8.0 | All | All | All |
| Application | Isc | Bind | 9.8.0 | a1 | All | All |
| Application | Isc | Bind | 9.8.0 | b1 | All | All |
| Application | Isc | Bind | 9.8.0 | p1 | All | All |
| Application | Isc | Bind | 9.8.0 | p2 | All | All |
| Application | Isc | Bind | 9.8.0 | p4 | All | All |
| Application | Isc | Bind | 9.8.0 | rc1 | All | All |
| Application | Isc | Bind | 9.8.1 | All | All | All |
| Application | Isc | Bind | 9.8.1 | b1 | All | All |
| Application | Isc | Bind | 9.8.1 | b2 | All | All |
| Application | Isc | Bind | 9.8.1 | b3 | All | All |
| Application | Isc | Bind | 9.8.1 | p1 | All | All |
| Application | Isc | Bind | 9.8.1 | rc1 | All | All |
| Application | Isc | Bind | 9.8.2 | b1 | All | All |
| Application | Isc | Bind | 9.8.2 | rc1 | All | All |
| Application | Isc | Bind | 9.8.2 | rc2 | All | All |
| Application | Isc | Bind | 9.8.3 | All | All | All |
| Application | Isc | Bind | 9.8.3 | p1 | All | All |
| Application | Isc | Bind | 9.8.3 | p2 | All | All |
| Application | Isc | Bind | 9.8.4 | All | All | All |
| Application | Isc | Bind | 9.8.5 | All | All | All |
| Application | Isc | Bind | 9.8.5 | b1 | All | All |
| Application | Isc | Bind | 9.8.5 | b2 | All | All |
| Application | Isc | Bind | 9.8.5 | p1 | All | All |
| Application | Isc | Bind | 9.8.5 | rc1 | All | All |
| Application | Isc | Bind | 9.8.5 | rc2 | All | All |
| Application | Isc | Bind | 9.8.6 | b1 | All | All |
| Application | Isc | Bind | 9.9.0 | All | All | All |
| Application | Isc | Bind | 9.9.0 | a1 | All | All |
| Application | Isc | Bind | 9.9.0 | a2 | All | All |
| Application | Isc | Bind | 9.9.0 | a3 | All | All |
| Application | Isc | Bind | 9.9.0 | b1 | All | All |
| Application | Isc | Bind | 9.9.0 | b2 | All | All |
| Application | Isc | Bind | 9.9.0 | rc1 | All | All |
| Application | Isc | Bind | 9.9.0 | rc2 | All | All |
| Application | Isc | Bind | 9.9.0 | rc3 | All | All |
| Application | Isc | Bind | 9.9.0 | rc4 | All | All |
| Application | Isc | Bind | 9.9.1 | All | All | All |
| Application | Isc | Bind | 9.9.1 | p1 | All | All |
| Application | Isc | Bind | 9.9.1 | p2 | All | All |
| Application | Isc | Bind | 9.9.2 | All | All | All |
| Application | Isc | Bind | 9.9.3 | All | All | All |
| Application | Isc | Bind | 9.9.3 | b1 | All | All |
| Application | Isc | Bind | 9.9.3 | b2 | All | All |
| Application | Isc | Bind | 9.9.3 | p1 | All | All |
| Application | Isc | Bind | 9.9.3 | rc1 | All | All |
| Application | Isc | Bind | 9.9.3 | rc2 | All | All |
| Application | Isc | Dnsco Bind | 9.9.3 | s1 | All | All |
| Application | Isc | Dnsco Bind | 9.9.4 | s1b1 | All | All |
| Operating System | Mandriva | Business Server | 1.0 | All | All | All |
| Operating System | Mandriva | Enterprise Server | 5.0 | All | All | All |
| Operating System | Novell | Suse Linux | 11 | All | desktop | All |
| Operating System | Novell | Suse Linux | 11 | All | server | All |
| Operating System | Opensuse | Opensuse | 11.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 5 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 6.0 | All | All | All |
| Operating System | Slackware | Slackware Linux | 12.1 | All | All | All |
| Operating System | Slackware | Slackware Linux | 12.2 | All | All | All |
| Operating System | Slackware | Slackware Linux | 13.0 | All | All | All |
| Operating System | Slackware | Slackware Linux | 13.1 | All | All | All |
| Operating System | Slackware | Slackware Linux | 13.37 | All | All | All |
| Application | Suse | Suse Linux Enterprise Software Development Kit | 11.0 | sp2 | All | All |
| Application | Suse | Suse Linux Enterprise Software Development Kit | 11.0 | sp3 | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [security-announce] SUSE-SU-2013:1310-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Vendor Advisory |
| Zero Day Initiative | af854a3a-2127-422b-91ae-364da2661108 | www.zerodayinitiative.com | |
| CVE-2013-4854: FAQ and Supplemental Information | Internet Systems Consortium Knowledge Base | af854a3a-2127-422b-91ae-364da2661108 | kb.isc.org | Vendor Advisory |
| Security Advisory SA54323 - Ubuntu update for bind9 - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Debian -- Security Information -- DSA-2728-1 bind9 | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| [security-announce] openSUSE-SU-2013:1354-1: important: update for bind | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Vendor Advisory |
| 404 Not Found | af854a3a-2127-422b-91ae-364da2661108 | linux.oracle.com | |
| Security Advisory SA54134 - Red Hat update for bind - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| USN-1910-1: Bind vulnerability | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | Vendor Advisory |
| McAfee KnowledgeBase - McAfee Security Bulletin – Updates for multiple McAfee Network products resolve BIND vulnerability | af854a3a-2127-422b-91ae-364da2661108 | kc.mcafee.com | |
| About Secunia Research | Flexera | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| CVE-2013-4854: A specially crafted query can cause BIND to terminate abnormally | Internet Systems Consortium Knowledge Base | af854a3a-2127-422b-91ae-364da2661108 | kb.isc.org | Vendor Advisory |
| About the security content of OS X Server v4.0 - Apple Support | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay | af854a3a-2127-422b-91ae-364da2661108 | h20564.www2.hp.com | Vendor Advisory |
| Security Advisory SA54185 - Red Hat update for bind97 - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| [SECURITY] Fedora 18 Update: bind-9.9.3-4.P2.fc18 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | Vendor Advisory |
| Security Advisory SA54207 - FreeBSD update for bind - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| ISC BIND 9 DNS RDATA Handling CVE-2013-4854 Remote Denial of Service Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | Vendor Advisory |
| NEOHAPSIS - Peace of Mind Through Integrity and Insight | af854a3a-2127-422b-91ae-364da2661108 | archives.neohapsis.com | |
| ISC BIND RDATA Processing Bug Lets Remote Users Deny Service - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| Security Advisory SA54211 - Debian update for bind9 - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Support / Security / Advisories / / MDVSA-2013:202 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | Vendor Advisory |
| [SECURITY] Fedora 19 Update: bind-9.9.3-5.P2.fc19 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | Vendor Advisory |
| www.freebsd.org/security/advisories/FreeBSD-SA-13:07.bind.asc | af854a3a-2127-422b-91ae-364da2661108 | www.freebsd.org | Vendor Advisory |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| archives.neohapsis.com/archives/bugtraq/2013-08/0030.html | af854a3a-2127-422b-91ae-364da2661108 | archives.neohapsis.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.