{"id":"CVE-2012-5166","details":"ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.","modified":"2026-02-04T03:31:29.783796Z","published":"2012-10-10T21:55:00Z","related":["SUSE-SU-2015:0011-2","SUSE-SU-2015:0480-1","openSUSE-SU-2024:10467-1"],"references":[{"type":"ADVISORY","url":"http://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asc"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1363.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1364.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1365.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/50903"},{"type":"ADVISORY","url":"http://secunia.com/advisories/50909"},{"type":"ADVISORY","url":"http://secunia.com/advisories/50956"},{"type":"ADVISORY","url":"http://secunia.com/advisories/51054"},{"type":"ADVISORY","url":"http://secunia.com/advisories/51078"},{"type":"ADVISORY","url":"http://secunia.com/advisories/51096"},{"type":"ADVISORY","url":"http://secunia.com/advisories/51106"},{"type":"ADVISORY","url":"http://secunia.com/advisories/51178"},{"type":"ADVISORY","url":"http://www.debian.org/security/2012/dsa-2560"},{"type":"ADVISORY","url":"http://www.isc.org/software/bind/advisories/cve-2012-5166"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:162"},{"type":"ADVISORY","url":"https://kb.isc.org/article/AA-00801"},{"type":"ARTICLE","url":"https://blogs.oracle.com/sunsecurity/entry/cve_2012_5166_denial_of"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090346.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090491.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090586.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.html"},{"type":"WEB","url":"http://osvdb.org/86118"},{"type":"WEB","url":"http://support.apple.com/kb/HT5880"},{"type":"WEB","url":"http://www.ibm.com/support/docview.wss?uid=isg1IV30185"},{"type":"WEB","url":"http://www.ibm.com/support/docview.wss?uid=isg1IV30247"},{"type":"WEB","url":"http://www.ibm.com/support/docview.wss?uid=isg1IV30364"},{"type":"WEB","url":"http://www.ibm.com/support/docview.wss?uid=isg1IV30365"},{"type":"WEB","url":"http://www.ibm.com/support/docview.wss?uid=isg1IV30366"},{"type":"WEB","url":"http://www.ibm.com/support/docview.wss?uid=isg1IV30367"},{"type":"WEB","url":"http://www.ibm.com/support/docview.wss?uid=isg1IV30368"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/55852"},{"type":"WEB","url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004"},{"type":"WEB","url":"http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"},{"type":"WEB","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19706"}],"schema_version":"1.7.3"}