{"id":"CVE-2010-3613","details":"named in ISC BIND 9.6.2 before 9.6.2-P3, 9.6-ESV before 9.6-ESV-R3, and 9.7.x before 9.7.2-P3 does not properly handle the combination of signed negative responses and corresponding RRSIG records in the cache, which allows remote attackers to cause a denial of service (daemon crash) via a query for cached data.","modified":"2026-02-04T03:59:42.482497Z","published":"2010-12-06T13:44:54Z","related":["openSUSE-SU-2024:10467-1"],"references":[{"type":"ADVISORY","url":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2011-001.txt.asc"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42374"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42459"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42522"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42671"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42707"},{"type":"ADVISORY","url":"http://secunia.com/advisories/43141"},{"type":"ADVISORY","url":"http://www.debian.org/security/2010/dsa-2130"},{"type":"ADVISORY","url":"http://www.isc.org/announcement/guidance-regarding-dec-1st-2010-security-advisories"},{"type":"ADVISORY","url":"http://www.isc.org/software/bind/advisories/cve-2010-3613"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:253"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1025-1"},{"type":"ADVISORY","url":"http://www.vmware.com/security/advisories/VMSA-2011-0004.html"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/3102"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/3103"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/3138"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/3139"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/3140"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0267"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0606"},{"type":"WEB","url":"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051910.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051963.html"},{"type":"WEB","url":"http://lists.vmware.com/pipermail/security-announce/2011/000126.html"},{"type":"WEB","url":"http://marc.info/?l=bugtraq&m=130270720601677&w=2"},{"type":"WEB","url":"http://securitytracker.com/id?1024817"},{"type":"WEB","url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.622190"},{"type":"WEB","url":"http://support.apple.com/kb/HT5002"},{"type":"WEB","url":"http://support.avaya.com/css/P8/documents/100124923"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/706148"},{"type":"WEB","url":"http://www.osvdb.org/69558"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2010-0975.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2010-0976.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2010-1000.html"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/516909/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/bid/45133"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12601"}],"schema_version":"1.7.3"}