fkie_cve-2009-4022
Vulnerability from fkie_nvd
Published
2009-11-25 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438.
References
secalert@redhat.comftp://ftp.sco.com/pub/unixware7/714/security/p535243_uw7/p535243b.txt
secalert@redhat.comhttp://aix.software.ibm.com/aix/efixes/security/bind9_advisory.asc
secalert@redhat.comhttp://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
secalert@redhat.comhttp://lists.vmware.com/pipermail/security-announce/2010/000082.html
secalert@redhat.comhttp://osvdb.org/60493
secalert@redhat.comhttp://secunia.com/advisories/37426Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/37491Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/38219Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/38240Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/38794Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/38834Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/39334Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/40730Vendor Advisory
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-77-1021660.1-1
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-77-1021798.1-1
secalert@redhat.comhttp://support.apple.com/kb/HT5002
secalert@redhat.comhttp://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
secalert@redhat.comhttp://www.ibm.com/support/docview.wss?uid=isg1IZ68597
secalert@redhat.comhttp://www.ibm.com/support/docview.wss?uid=isg1IZ71667
secalert@redhat.comhttp://www.ibm.com/support/docview.wss?uid=isg1IZ71774
secalert@redhat.comhttp://www.kb.cert.org/vuls/id/418861US Government Resource
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2009:304
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2009/11/24/1
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2009/11/24/2
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2009/11/24/8
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2009-1620.htmlVendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/37118
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-888-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/3335Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/0176Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/0528Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/0622Vendor Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=538744Patch
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/54416
secalert@redhat.comhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-3152
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10821
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11745
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7261
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7459
secalert@redhat.comhttps://www.isc.org/advisories/CVE-2009-4022v6Vendor Advisory
secalert@redhat.comhttps://www.isc.org/advisories/CVE2009-4022Vendor Advisory
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2009-November/msg01172.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2009-November/msg01188.html
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/unixware7/714/security/p535243_uw7/p535243b.txt
af854a3a-2127-422b-91ae-364da2661108http://aix.software.ibm.com/aix/efixes/security/bind9_advisory.asc
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://lists.vmware.com/pipermail/security-announce/2010/000082.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/60493
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37426Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37491Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38219Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38240Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38794Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38834Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/39334Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40730Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021660.1-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021798.1-1
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5002
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IZ68597
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IZ71667
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IZ71774
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/418861US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:304
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/11/24/1
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/11/24/2
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/11/24/8
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-1620.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/37118
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-888-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/3335Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0176Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0528Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0622Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=538744Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/54416
af854a3a-2127-422b-91ae-364da2661108https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-3152
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10821
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11745
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7261
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7459
af854a3a-2127-422b-91ae-364da2661108https://www.isc.org/advisories/CVE-2009-4022v6Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.isc.org/advisories/CVE2009-4022Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01172.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01188.html
Impacted products
Vendor Product Version
isc bind 9.0
isc bind 9.0.0
isc bind 9.0.0
isc bind 9.0.0
isc bind 9.0.0
isc bind 9.0.0
isc bind 9.0.0
isc bind 9.0.1
isc bind 9.0.1
isc bind 9.0.1
isc bind 9.1
isc bind 9.1.0
isc bind 9.1.1
isc bind 9.1.1
isc bind 9.1.1
isc bind 9.1.1
isc bind 9.1.1
isc bind 9.1.1
isc bind 9.1.1
isc bind 9.1.1
isc bind 9.1.2
isc bind 9.1.2
isc bind 9.1.3
isc bind 9.1.3
isc bind 9.1.3
isc bind 9.1.3
isc bind 9.2
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.1
isc bind 9.2.1
isc bind 9.2.1
isc bind 9.2.2
isc bind 9.2.2
isc bind 9.2.2
isc bind 9.2.2
isc bind 9.2.3
isc bind 9.2.3
isc bind 9.2.3
isc bind 9.2.3
isc bind 9.2.3
isc bind 9.2.4
isc bind 9.2.4
isc bind 9.2.4
isc bind 9.2.4
isc bind 9.2.4
isc bind 9.2.4
isc bind 9.2.4
isc bind 9.2.4
isc bind 9.2.5
isc bind 9.2.5
isc bind 9.2.5
isc bind 9.2.6
isc bind 9.2.6
isc bind 9.2.7
isc bind 9.2.7
isc bind 9.2.7
isc bind 9.2.7
isc bind 9.2.8
isc bind 9.2.9
isc bind 9.2.9
isc bind 9.3
isc bind 9.3.0
isc bind 9.3.0
isc bind 9.3.0
isc bind 9.3.0
isc bind 9.3.0
isc bind 9.3.0
isc bind 9.3.0
isc bind 9.3.0
isc bind 9.3.1
isc bind 9.3.1
isc bind 9.3.1
isc bind 9.3.2
isc bind 9.3.2
isc bind 9.3.3
isc bind 9.3.3
isc bind 9.3.3
isc bind 9.3.3
isc bind 9.3.4
isc bind 9.3.5
isc bind 9.3.5
isc bind 9.3.5
isc bind 9.3.6
isc bind 9.3.6
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.1
isc bind 9.4.2
isc bind 9.4.2
isc bind 9.4.2
isc bind 9.4.3
isc bind 9.4.3
isc bind 9.4.3
isc bind 9.4.3
isc bind 9.4.3
isc bind 9.4.3
isc bind 9.4.3
isc bind 9.4.3
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.1
isc bind 9.5.1
isc bind 9.5.1
isc bind 9.5.1
isc bind 9.5.1
isc bind 9.5.1
isc bind 9.5.2
isc bind 9.5.2
isc bind 9.5.2
isc bind 9.6.0
isc bind 9.6.0
isc bind 9.6.0
isc bind 9.6.0
isc bind 9.6.0
isc bind 9.6.0
isc bind 9.6.1
isc bind 9.6.1
isc bind 9.6.1
isc bind 9.6.1
isc bind 9.7.0
isc bind 9.7.0
isc bind 9.7.0
isc bind 9.7.0
isc bind 9.7.0
isc bind 9.7.0
isc bind 9.7.0
isc bind 9.7.0
isc bind 9.7.0
isc bind 9.7.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C52373DC-3E05-424B-9C78-4092A75C75A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AFE06E29-0A16-4034-A2BB-696A49798F00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "75CECA87-F721-429B-8062-D3297233C14D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "2F1447B1-A25F-45CC-B721-3204D7107999",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "C61FB240-C932-4A3A-874D-5872F01EB352",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "999AF289-8D73-4648-ABCB-4853B9B1F230",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "6743968D-DDB2-4478-867A-642CCC492B96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "098633E6-88F0-4DBC-986F-D11EDA29877F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "78725CCE-C153-4B00-8E76-ED6DFC1C86A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1950F046-FBD4-4A92-BA70-5E80374A12AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1861756C-CC81-4EAB-8427-57A3C62BFF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5E53EFD9-16B8-457D-8C27-7771018EA524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD642FC-1764-4090-A32D-830CEAE69E53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "79503328-9EE2-414E-A6E8-B3BABA0D6CAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2ABA5AA3-8951-4158-A4C6-64BE2010D39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "77A2D767-8E2D-4D65-ACF3-634B055023CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "D28C3D4C-5C3B-4686-9F67-6379C2AC338A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.1:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "543DE620-09A2-4055-B30C-803C714237B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.1:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "2C16513C-48A1-4FB6-AB11-F844ABC4BB66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.1:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "607BF60B-27F1-4C85-BB5F-D66FEA05CD4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE954FD0-56AF-4757-BAA8-B0C64703F6AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0EC243E5-D80C-43A8-AD12-5DA0FA442086",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF891263-4ACE-47C3-83F3-C06E49F32451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "01C3704B-8328-46C3-ACB1-D27FD7DED508",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF9000CE-EB3A-4194-84D1-4BB4C5010D29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "19A4E6C3-CF69-4A81-B179-EB8F656E72AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F947835-8E96-4793-B81E-EEC103BF0CB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6520F4-B203-400A-8629-8A40B739DB11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "55D7907A-46D1-4F7D-8B2F-321214204704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:a2:*:*:*:*:*:*",
              "matchCriteriaId": "B06686CF-0FFD-45D8-A9F6-D13DCF3E6EB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:a3:*:*:*:*:*:*",
              "matchCriteriaId": "EBF04613-7F33-4A63-A776-47C9A0BDBF1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "FA3C3939-2065-4A8C-99F8-BE44D1D2ABA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "DEE416F3-CDAE-4285-9EC7-F3E161EDCA0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "365BFA38-A0F6-4D48-A6B5-E534F88516DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc10:*:*:*:*:*:*",
              "matchCriteriaId": "CF2F3360-F5C2-47C1-B2E7-935CDB47407A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "52FBAE24-C9F7-4756-A7A0-A877ABFC3444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "A7230CE4-CD95-484C-A004-457FD4484403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "A0BB3172-BFBC-4F56-8116-6EEC30FD566F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D40FB919-A955-419D-9BEC-835F93E4FEF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FF8A8F48-A890-4837-8C76-1A690523B39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "399D70C9-8E61-4624-A7AD-9410AA7641B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "2BB2F03D-96C6-49CD-80FA-570FF72B493F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc9:*:*:*:*:*:*",
              "matchCriteriaId": "60DC3DF4-4B36-4AA8-8561-C4255A8C4E18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF07E87-B109-4B15-A358-7A454502E077",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "2E5D0852-413F-4875-93F5-64DDBCA6E85E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "301BF336-6AF6-4705-9BF1-00ED6608F572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "614C9459-D526-4880-AE03-4A1558CB941F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.2:p2:*:*:*:*:*:*",
              "matchCriteriaId": "A8B15E71-656A-4EB7-96B2-2CC9A2C19DC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*",
              "matchCriteriaId": "A969C3E7-9E4F-4767-86D1-7E6B3970A7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "34B56EBF-6218-46B7-A9F2-288E40635FAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CFA05CD-0BE4-4E85-A3DE-8B3E2622159F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A10ACCBC-6697-4BCB-9748-B966D83E0C03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "719382EA-7D4E-46F2-92ED-DCA83AE685BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "9EDF0B51-76D3-4BD8-A2C7-6F21153CB886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.3:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "2D800F08-9B7A-4284-B2EF-DCDF60DEEC04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D43375C5-0736-43DE-99B5-B75719D0AD0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4E492452-CBDB-43BC-A9AD-21AA84EA0653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "D5BD68D9-6CD9-48A7-A242-38B9ADD420BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "65C15AB2-DCA7-4983-A741-3CA1D4A391A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "6C6DB780-C075-462C-B426-1917A020C4BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "3B4FD922-49B2-4953-8EF2-9018B104BC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "367DC15C-7174-4463-8D4B-B3E43AC0A57E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "CAEC7B62-DBBF-4ADD-81F7-8AD1F3642E92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4360536-0BA6-41DB-AA87-45AFB51562CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.5:b2:*:*:*:*:*:*",
              "matchCriteriaId": "E3CBD1CC-14DF-4F00-9A5E-6D7A6604A8A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "93C5ED24-5A13-4F06-BC9F-B8B8F46C1888",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "438AEC8C-DD71-4A25-9E9D-A89415F7EC83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36A47938-C5AC-4471-A791-6F21AE20B85C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CDF6B08-6BA8-400C-BF01-ABD2306FE0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AFEDAAA4-AB94-43C6-97AE-B6E87D8E81B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FAF29410-5230-42F9-BC07-B940FC66DA62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.7:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "82068202-DF42-4808-A5C7-1A68B05EA1C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3014690C-784C-487D-A378-4B977C8460E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "90E4653A-C63A-4568-BFF2-ECAB7AB5A55C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FCF6B377-2B03-429D-B452-3269E6FA8031",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FA93166-513D-40AA-9855-FC89060BA03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "847C1017-F964-4A33-BEA8-DDB202DD0FB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "87B48470-26BF-4AE5-BEF3-7A2C82D59513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "D795C310-AC2A-4680-B516-508F7AF584AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "EAA7F932-4DA1-4B03-8761-AB2353B4935E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F5DC0048-3DC4-40A7-99A2-7686B3DA4FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "F43C77D0-2052-417D-9EA8-1A89A06BF010",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F574AA97-6037-4957-9BDD-6C720B3A292B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "6B67499F-7A9D-467B-834B-F4D61DBBE313",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B0D8854-64B6-42C9-B4D2-B2AF16AC0F03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.1:b2:*:*:*:*:*:*",
              "matchCriteriaId": "6CB6CACC-3E1E-4115-AC9B-C9F99522D4C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "062A3D39-9B49-49D3-8FB4-FB4FC4A71D34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "92F95086-3107-4C38-BB3B-7BABA9BD15C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "8669EA1C-DAA7-44FC-B675-01641BB8787E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE49740-2220-4305-BB8A-80E56CF4D9E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0AD5E3F3-CAF7-4A41-A26E-087D74799EF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9730D243-BBDF-483B-B709-7EDF708CE277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "EAD0B6DB-91E5-4891-BA45-A68BEA6FBB51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5B579EF-A538-4AA4-BDE8-CDB39E155A83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "23BFA179-11A1-436D-805A-9814B85AEEB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3D881EBA-B012-4014-A08F-F6B3795653C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.5:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9431455C-07E8-40E7-87D9-E6FE6F53D76D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "01CA8370-ACF5-4DEC-8D3C-C502A97A101C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A92E77F8-43FE-49C7-BCDA-1F6E8EB0DD2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7C7524-6943-4D94-8835-0221F0F0CD63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "C4B45FE3-307E-4599-B2CF-5203FA606469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a2:*:*:*:*:*:*",
              "matchCriteriaId": "F12E3841-1CF0-4969-A286-50769BAE31EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a3:*:*:*:*:*:*",
              "matchCriteriaId": "D8B11586-1274-422D-873A-25DF193FB0C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a4:*:*:*:*:*:*",
              "matchCriteriaId": "87D61CDA-BB78-4957-A502-6D77B567B3F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a5:*:*:*:*:*:*",
              "matchCriteriaId": "5A31533C-BD6E-4EB4-8047-3257BF51F592",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a6:*:*:*:*:*:*",
              "matchCriteriaId": "D8537C88-4F73-43DD-9BDC-AF470882EED2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "6D7D1A96-0A8E-4E3A-9442-701E3D1A1F5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "93C23313-817F-4AB5-9058-31B0C7F954A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "FA9F93EC-1AA2-43A6-9869-8974C819370A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "726720E2-4B59-4665-A72E-E2E996957EAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "8F0AA9D0-9657-4E18-BF8B-45284C2D40A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "32E4FEA8-A654-4E9F-8948-5878E7C427C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "916D4013-27A5-4688-A985-A9B77F90AC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8583B8D-54A4-4064-810B-34F4F5A33A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "932E3F02-DD98-43FC-8077-50506E512989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "63C2A2FD-7AE7-462A-99B2-809BE1F35C15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E01A12DF-E94B-426E-8751-96FC56105D5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.3:b1:*:*:*:*:*:*",
              "matchCriteriaId": "7717B1A2-CAF5-49F3-AC73-273074BBEE02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.3:b2:*:*:*:*:*:*",
              "matchCriteriaId": "F037EE61-50D6-4C1E-B24B-25A6D212E7E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.3:b3:*:*:*:*:*:*",
              "matchCriteriaId": "5140F118-BC25-43CB-B19C-0885A44D6646",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.3:p1:*:*:*:*:*:*",
              "matchCriteriaId": "099A0900-9A16-4431-BECA-B02D7C810153",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.3:p2:*:*:*:*:*:*",
              "matchCriteriaId": "82B9397F-463E-4F73-86F6-4EF3368E14BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.3:p3:*:*:*:*:*:*",
              "matchCriteriaId": "CAC96840-758A-4A47-8D12-AA42640778C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "19ADAB10-BDD0-409E-93C2-9E7223464131",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CEF8AD-9EE7-4ADA-888E-883751962529",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "76B4ED8A-9182-4403-8F66-3EB360E73477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:a2:*:*:*:*:*:*",
              "matchCriteriaId": "84046EF9-AF5F-43FA-8E2C-11C7A01D17F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:a3:*:*:*:*:*:*",
              "matchCriteriaId": "7545BB70-5C74-47A7-BB07-765BC8C2A5A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:a4:*:*:*:*:*:*",
              "matchCriteriaId": "AE6BFDBD-DE4D-407F-86A4-FA78F99AA531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:a5:*:*:*:*:*:*",
              "matchCriteriaId": "4337C3FF-C15B-4EFD-AA13-F9CA0542C2FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:a6:*:*:*:*:*:*",
              "matchCriteriaId": "AB6534DE-1ACB-4BCE-87A4-901F02F6CDCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:a7:*:*:*:*:*:*",
              "matchCriteriaId": "BE5F1A64-2428-4F85-8B93-3E324E983D2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "5F5D6222-3C1D-42FA-8882-1EE28B94D900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "08899782-3182-46EB-947D-3BA9C371ACA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "575443B1-1638-497E-BCCF-E725B386ED88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "30616740-FC69-4B92-B997-B7AF7643656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "3E306D3A-11AE-4F35-971E-B47D47628052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:p2_w1:*:*:*:*:*:*",
              "matchCriteriaId": "4FF37B1D-04AD-4E37-A238-34BE7C5311E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:p2_w2:*:*:*:*:*:*",
              "matchCriteriaId": "6AAEE115-8EA0-4E2B-9960-647967B39606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "90EE9C4A-F014-4ABA-9C4C-5D9561DD0A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F592D0F-095C-4F3B-97E7-E92C259D0CD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.1:b1:*:*:*:*:*:*",
              "matchCriteriaId": "B6215F13-D97D-47DE-8057-906159D368A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.1:b2:*:*:*:*:*:*",
              "matchCriteriaId": "896C4F70-B1F7-49D5-9E4A-98D33B3B2E25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.1:b3:*:*:*:*:*:*",
              "matchCriteriaId": "3A6DFF99-0890-4DE1-8AF4-6809EA485ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C55EC1E1-4D79-4357-94CB-7E152DFDE8DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "83205FA5-56A2-4BBD-9278-2844704BAB07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4449E90-2112-4860-A981-66639B9318ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.2:b1:*:*:*:*:*:*",
              "matchCriteriaId": "110C71B3-D6E0-485E-9C4B-3D155CE16047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A49A7D91-73BC-4894-A548-C46691AA66AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F42F7AF7-D37C-4213-B2BC-D2B9FE725BDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "A964450E-7DA8-478B-923E-E8CD1BA0F09C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "32FAE1EF-3BF0-4B12-8F08-AA061A6D63FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "5ABB3FC8-0A0D-4881-9137-5F6A8CCB9345",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C02A3BC0-78A4-4F4D-AA5B-3C05122137EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "178C7D9F-8699-42A3-8729-0BC6323EBDF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BEF53C6-E555-49D4-B4B2-63BA71CC77E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.1:b1:*:*:*:*:*:*",
              "matchCriteriaId": "2B4565A6-122B-406C-A7BE-A029F92799B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "3C09FA4C-B094-4BAC-A194-ACC28F80AF69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EEC21220-4207-4FE4-A7A9-9B223301B98D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B178BB5-A0DC-4014-A8CC-D89B0E2F9789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "1922EC10-F75A-41A5-B8AF-CDDCAA07A8B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.0:a2:*:*:*:*:*:*",
              "matchCriteriaId": "D243C684-DD10-4F84-8806-A5E9BEBC3204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.0:a3:*:*:*:*:*:*",
              "matchCriteriaId": "B0FC1DDA-B027-47C2-93CD-67013CB56388",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "1BE753CB-A16D-4605-8640-137CD4A2BB16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "037075F9-53E3-4DF6-B5C0-A6D1F5B60E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "886DF882-E3F9-46E9-BC62-0A48292654D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "5B5F1155-78D6-480B-BC0A-1D36B08D2594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E9478F4E-451D-4B4E-8054-E09522F97C59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "87393BF8-9FE3-4501-94CA-A1AA9E38E771",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed \"at the same time as requesting DNSSEC records (DO),\" aka Bug 20438."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en ISC BIND 9.0.x hasta la versi\u00f3n 9.3.x, 9.4 en versiones anteriores a 9.4.3-P4, 9.5 en versiones anteriores a 9.5.2-P1, 9.6 en versiones anteriores a 9.6.1-P2 y 9.7 beta en versiones anteriores a 9.7.0b3, con validaci\u00f3n DNSSEC habilitada y comprobaci\u00f3n deshabilitada (CD), permite a atacantes remotos llevar a cabo ataques de envenenamiento de la cach\u00e9 DNS recibiendo una consulta de cliente recursiva y enviando una respuesta que contiene una secci\u00f3n Additional con datos manipulados, lo cual no es manejado adecuadamente cuando la respuesta es procesada \"al mismo tiempo que se solicitan registros DNSSEC (DO)\", tambi\u00e9n conocida como Bug 20438."
    }
  ],
  "id": "CVE-2009-4022",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-11-25T16:30:00.937",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "ftp://ftp.sco.com/pub/unixware7/714/security/p535243_uw7/p535243b.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://aix.software.ibm.com/aix/efixes/security/bind9_advisory.asc"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/60493"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37426"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37491"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38219"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38240"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38794"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38834"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/39334"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40730"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021660.1-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021798.1-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT5002"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ68597"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ71667"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ71774"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/418861"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:304"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/24/1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/24/2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/24/8"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1620.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/37118"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-888-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3335"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0176"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0528"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0622"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=538744"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54416"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-3152"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10821"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11745"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7261"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7459"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.isc.org/advisories/CVE-2009-4022v6"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.isc.org/advisories/CVE2009-4022"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01172.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01188.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.sco.com/pub/unixware7/714/security/p535243_uw7/p535243b.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aix.software.ibm.com/aix/efixes/security/bind9_advisory.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/60493"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37426"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37491"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38219"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38240"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38794"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38834"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/39334"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40730"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021660.1-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021798.1-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT5002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ68597"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ71667"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ71774"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/418861"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:304"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/24/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/24/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/24/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1620.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/37118"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-888-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3335"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0176"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0528"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0622"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=538744"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54416"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-3152"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10821"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11745"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7261"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7459"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.isc.org/advisories/CVE-2009-4022v6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.isc.org/advisories/CVE2009-4022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01172.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01188.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…