Vulnerability Name:

CVE-2013-5661 (CCN-132735)

Assigned:2013-09-09
Published:2013-09-09
Updated:2019-11-08
Summary:Cache Poisoning issue exists in DNS Response Rate Limiting.
CVSS v3 Severity:5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:2.6 Low (CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
1.9 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-290
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2013-5661

Source: CCN
Type: Red Hat Bugzilla – Bug 1038750
(CVE-2013-5661) CVE-2013-5661 DNS response rate limiting can simplify cache poisoning attacks

Source: MISC
Type: Issue Tracking, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5661

Source: MISC
Type: Issue Tracking, Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-5661

Source: XF
Type: UNKNOWN
bind-cve20135661-weak-security(132735)

Source: MISC
Type: Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2013-5661

Source: CCN
Type: Internet Systems Consortium Web site
Cache poisoning gets a second wind from RRL? Probably not

Source: CCN
Type: Knot Resolver Web site
Knot Resolver 1.3.0 released

Source: CCN
Type: NSD Web site
NSD: Name Server Daemon

Vulnerable Configuration:Configuration 1:
  • cpe:/a:isc:bind:*:*:*:*:*:*:*:* (Version >= 9.8.0 and <= 9.9.0)

  • Configuration 2:
  • cpe:/a:nlnetlabs:nsd:3.2.15:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:nic:knot_resolver:*:*:*:*:*:*:*:* (Version < 1.3.0)

  • Configuration 4:
  • cpe:/o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:isc:bind:9.8.0:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:9.9.0:*:*:*:*:*:*:*
  • OR cpe:/a:nlnetlabs:name_server_daemon:3.2.15:-:*:*:*:*:*:*
  • OR cpe:/a:knot-resolver:knot_resolver:1.3.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.precise:def:20135661000
    V
    CVE-2013-5661 on Ubuntu 12.04 LTS (precise) - negligible.
    2013-12-06
    BACK
    isc bind *
    nlnetlabs nsd 3.2.15
    nic knot resolver *
    redhat enterprise linux 6.0
    redhat enterprise linux 7.0
    isc bind 9.8.0
    isc bind 9.9.0
    nlnetlabs name server daemon 3.2.15 -
    knot-resolver knot resolver 1.3.0