### [CVE-2012-1667](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record. ### POC #### Reference - http://www.kb.cert.org/vuls/id/381699 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/C4ssif3r/nmap-scripts - https://github.com/DButter/whitehat_public - https://github.com/Dokukin1/Metasploitable - https://github.com/Iknowmyname/Nmap-Scans-M2 - https://github.com/NikulinMS/13-01-hw - https://github.com/Zhivarev/13-01-hw - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/stran0s/stran0s - https://github.com/zzzWTF/db-13-01