CVE-2013-2266

Publication date 26 March 2013

Last updated 24 July 2024


Ubuntu priority

libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.

Read the notes from the security team

Status

Package Ubuntu Release Status
bind9 12.10 quantal
Fixed 1:9.8.1.dfsg.P1-4.2ubuntu3.2
12.04 LTS precise
Fixed 1:9.8.1.dfsg.P1-4ubuntu0.6
11.10 oneiric
Fixed 1:9.7.3.dfsg-1ubuntu4.6
10.04 LTS lucid
Fixed 1:9.7.0.dfsg.P1-1ubuntu0.9
8.04 LTS hardy
Not affected

Notes


seth-arnold

No patch will be provided for 9.7. The suggested workaround is re-compile without regex support.

References

Related Ubuntu Security Notices (USN)

Other references