Think you have a false positive on this rule?

Sid 1-26324

Message

PROTOCOL-DNS ISC BIND NAPTR record regular expression handling denial of service attempt

Summary

libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.

Impact

CVSS base score 7.8 CVSS impact score 6.9 CVSS exploitability score 10.0 confidentialityImpact NONE integrityImpact NONE availabilityImpact NONE

CVE-2013-2266:

CVSS base score 7.8

CVSS impact score 6.9

CVSS exploitability score 10.0

Confidentiality Impact NONE

Integrity Impact NONE

Availability Impact COMPLETE

Detailed information

CVE-2013-2266: libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.

Affected systems

  • isc bind 9.7.0
  • isc bind 9.7.0a1
  • isc bind 9.7.0a2
  • isc bind 9.7.0a3
  • isc bind 9.7.0b1
  • isc bind 9.7.0b2
  • isc bind 9.7.0b3
  • isc bind 9.7.1
  • isc bind 9.7.1b1
  • isc bind 9.7.2
  • isc bind 9.7.3
  • isc bind 9.7.4
  • isc bind 9.7.4b1
  • isc bind 9.7.5
  • isc bind 9.7.6
  • isc bind 9.8.0
  • isc bind 9.8.1
  • isc bind 9.8.2
  • isc bind 9.8.3
  • isc bind 9.8.4
  • isc bind 9.8.5
  • isc bind 9.9.0
  • isc bind 9.9.1
  • isc bind 9.9.2
  • isc bind 9.9.3

Ease of attack

CVE-2013-2266:

Access Vector NETWORK

Access Complexity LOW

Authentication NONE

False positives

None known

False negatives

None known

Corrective action

Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References

  • www.isc.org/software/bind/advisories/cve-2013-2266