Vulnerability Name: | CVE-2013-5661 (CCN-132735) | ||||||||||||
Assigned: | 2013-09-09 | ||||||||||||
Published: | 2013-09-09 | ||||||||||||
Updated: | 2019-11-08 | ||||||||||||
Summary: | Cache Poisoning issue exists in DNS Response Rate Limiting. | ||||||||||||
CVSS v3 Severity: | 5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)
| ||||||||||||
CVSS v2 Severity: | 2.6 Low (CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N) 1.9 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||
Vulnerability Type: | CWE-290 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2013-5661 Source: CCN Type: Red Hat Bugzilla Bug 1038750 (CVE-2013-5661) CVE-2013-5661 DNS response rate limiting can simplify cache poisoning attacks Source: MISC Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5661 Source: MISC Type: Issue Tracking, Third Party Advisory https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-5661 Source: XF Type: UNKNOWN bind-cve20135661-weak-security(132735) Source: MISC Type: Third Party Advisory https://security-tracker.debian.org/tracker/CVE-2013-5661 Source: CCN Type: Internet Systems Consortium Web site Cache poisoning gets a second wind from RRL? Probably not Source: CCN Type: Knot Resolver Web site Knot Resolver 1.3.0 released Source: CCN Type: NSD Web site NSD: Name Server Daemon | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |