mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-29 05:56:17 +00:00
581 lines
20 KiB
JSON
581 lines
20 KiB
JSON
{
|
|
"id": "CVE-2013-2266",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2013-03-28T16:55:01.040",
|
|
"lastModified": "2025-04-11T00:51:21.963",
|
|
"vulnStatus": "Deferred",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "libdns en ISC BIND v9.7.x y v9.8.x antes v9.8.4-P2, v9.8.5 antes de v9.8.5b2, v9.9.x antes de v9.9.2-P2, y v9.9.3 antes v9.9.3b2 en plataformas UNIX permite a atacantes remotos para causar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de una expresi\u00f3n regular manipulada, como lo demuestra un ataque memoria de agotamiento contra un equipo que ejecuta un proceso llamado."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"baseScore": 7.8,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2B96B87-F18C-41EF-9A37-7D0842433A4E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AFA1AA14-4D4A-45D0-9573-D53C0FFFFF78"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F5DE1274-F7A1-4F12-A4F5-1CB1DD5B84E1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "401A7E61-AC3D-417D-97B8-E5E736DC6FCC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C7C37F7D-DD28-4C70-A534-A3F434DF4273"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B2EC1F99-85C1-4081-A118-790111741246"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "85D6C9B7-9D5D-4589-AC83-E6ECB535EBFD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "043A5E3F-529B-4A9A-8531-184EE6D1942D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "673057D5-256C-4933-B56F-4BF8848323F1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C2CE371B-E399-4D74-B46C-3606E4BDA53A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A3798A1-134C-4066-A012-10C15F103EAC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9CA1AEBE-040C-483A-9850-7DA888FF8075"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B9A33F04-3240-4268-B613-C4876770A30F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "91DA33F1-CA29-4EB1-8F95-8CEA71383BF4"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2A7BE793-7717-4019-8F50-158C309E48B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9BE322FB-CC6F-46BA-861C-74C16D7FC791"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5B178BB5-A0DC-4014-A8CC-D89B0E2F9789"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1BE753CB-A16D-4605-8640-137CD4A2BB16"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5B5F1155-78D6-480B-BC0A-1D36B08D2594"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A11247D0-A33E-4CE5-910A-F38B89C63EC0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9478F4E-451D-4B4E-8054-E09522F97C59"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "87393BF8-9FE3-4501-94CA-A1AA9E38E771"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FC642B5-ACA4-4764-A9F2-3C87D5D8E9E0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A16CE093-38E0-4274-AD53-B807DE72AF91"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FB97DEB-A0A4-458C-A94B-46B7264AB0F1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BFDF6597-7131-4080-BCFC-46032138646C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "881B8C5B-8A66-45AC-85E6-758B8A8153BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4E2D144E-6A15-4B45-8B15-15B60FB33D71"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B5690EC8-66C9-4316-BEAB-C218843F7FCC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FBF13572-C341-4FB1-BAFD-AF8F0C5EF510"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0B1D9F9C-54C2-485F-9B66-4AEA0573BC2E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "423211E8-A08B-4254-977A-1917AED9B794"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3ABE2712-33E9-45EE-890C-E9FC51D19B75"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD79961B-508F-4A20-AD4D-D766DFB928E7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E5510BF-3D22-49DA-A4C6-2D6204EB37C9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AD1BC4C7-F72B-43DB-B729-018360F4B281"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DB36BD1D-A6AB-4BC8-94C0-FA662622FF26"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DFF83126-E2C8-4156-9C28-7E3005A74E17"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "97D011B3-D9F3-4BC2-9695-A842148EA6BA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8BC43BF9-5C34-4DF1-846A-E416DE9C7DA8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ADD24439-71B4-41AC-85D4-56511445051C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B063AE57-D426-4565-B2D9-ACDB0C16C78E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CCEA5F9A-A308-4573-BBEB-6B210A61D943"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D13D4E84-04EB-4843-A1C4-E3265D1DAC00"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "434AA05B-1A22-474B-BEA3-CACAD78955F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E434E995-F554-45A7-A907-EE2725727B82"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4EBDD71E-6F17-4EB6-899F-E27A93CDFDF2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "811D03B2-96A8-47F9-80BE-54228A4108EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B3D4393C-1151-49F9-963B-B6FD88E93814"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "25855A5C-302F-4A82-AEC1-8C4C9CB70362"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "03E68ACA-0288-4EE5-9250-54711B2E6670"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8D717D3D-F4BF-470B-AC2B-D1234A7303EB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "66D259B7-4F9E-43B2-BB1D-3B097D3CDB28"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4F9DA20E-57EA-49A0-9DB2-E9E0191EC1AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FCC604FD-A834-4BA7-B1E2-1FCB6A583204"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "479D3C6C-1FD7-4DBE-A841-4B58400A89F1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BAF29160-63C2-40D0-BE08-3C8181CD5092"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8DAA3942-0979-4D33-BD52-EF7F0403DFBD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "39D75F93-B6A7-4D25-8147-25F7F867E5B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B046CE1D-03E1-462F-9762-9269E59BD554"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DAC9049D-6284-40F7-9E97-596FEDF9EEDA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "10D06B47-911B-4095-ABD2-DDD38E6306F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "59428551-218B-4C32-982F-DCDC894E2954"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "961E22DC-1467-4A0C-9450-A2E047FCFCFD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DF77CAF5-A8D6-4479-9C4D-A698D26BDC6A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AD318FF1-320B-4311-AF7E-988C023B4938"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BDCC8861-0655-4180-A083-1516AC441A3C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DB2E6ABE-B1CB-4603-AFC8-BB7BE1AD96B5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://linux.oracle.com/errata/ELSA-2014-1244",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=136804614120794&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=136804614120794&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0689.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0690.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://support.apple.com/kb/HT5880",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2013/dsa-2656",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.isc.org/software/bind/advisories/cve-2013-2266",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/58736",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.ubuntu.com/usn/USN-1783-1",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://kb.isc.org/article/AA-00871/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://kb.isc.org/article/AA-00879/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://linux.oracle.com/errata/ELSA-2014-1244",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=136804614120794&w=2",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=136804614120794&w=2",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0689.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0690.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://support.apple.com/kb/HT5880",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2013/dsa-2656",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.isc.org/software/bind/advisories/cve-2013-2266",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/58736",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.ubuntu.com/usn/USN-1783-1",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://kb.isc.org/article/AA-00871/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://kb.isc.org/article/AA-00879/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |