BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables.
Software | From | Fixed in |
---|---|---|
isc / bind | 4.9.3 | 4.9.3.x |
isc / bind | 4.9.5 | 4.9.5.x |
isc / bind | 4.9.5-p1 | 4.9.5-p1.x |
isc / bind | 4.9.6 | 4.9.6.x |
isc / bind | 4.9.7 | 4.9.7.x |
isc / bind | 8.2 | 8.2.x |
isc / bind | 8.2.1 | 8.2.1.x |
isc / bind | 8.2.2 | 8.2.2.x |
isc / bind | 8.2.2-p1 | 8.2.2-p1.x |
isc / bind | 8.2.2-p2 | 8.2.2-p2.x |
isc / bind | 8.2.2-p3 | 8.2.2-p3.x |
isc / bind | 8.2.2-p4 | 8.2.2-p4.x |
isc / bind | 8.2.2-p5 | 8.2.2-p5.x |
isc / bind | 8.2.2-p6 | 8.2.2-p6.x |
isc / bind | 8.2.2-p7 | 8.2.2-p7.x |