Files
CVEs-PoC/2012/CVE-2012-1667.md
2024-06-18 02:51:15 +02:00

27 lines
1.2 KiB
Markdown

### [CVE-2012-1667](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.
### POC
#### Reference
- http://www.kb.cert.org/vuls/id/381699
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/C4ssif3r/nmap-scripts
- https://github.com/DButter/whitehat_public
- https://github.com/Dokukin1/Metasploitable
- https://github.com/Iknowmyname/Nmap-Scans-M2
- https://github.com/NikulinMS/13-01-hw
- https://github.com/Zhivarev/13-01-hw
- https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems
- https://github.com/stran0s/stran0s
- https://github.com/zzzWTF/db-13-01