{"id":"CVE-2012-3817","details":"ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x before 9.7.6-P2; 9.8.x before 9.8.3-P2; 9.9.x before 9.9.1-P2; and 9.6-ESV before 9.6-ESV-R7-P2, when DNSSEC validation is enabled, does not properly initialize the failing-query cache, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) by sending many queries.","modified":"2026-04-10T03:42:25.789128Z","published":"2012-07-25T10:42:35Z","related":["SUSE-SU-2015:0011-2","SUSE-SU-2015:0480-1","openSUSE-SU-2024:10467-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1122.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1123.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/51096"},{"type":"ADVISORY","url":"http://www.debian.org/security/2012/dsa-2517"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1518-1"},{"type":"ADVISORY","url":"https://kb.isc.org/article/AA-00729"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2012-08/msg00013.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2012-08/msg00015.html"},{"type":"WEB","url":"http://support.apple.com/kb/HT5880"},{"type":"WEB","url":"http://www.securitytracker.com/id?1027296"},{"type":"WEB","url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004"}],"schema_version":"1.7.5"}