Vulnerability Note VU#706148

ISC BIND cache vulnerability

Original Release date: 01 Dec 2010 | Last revised: 16 Dec 2010


The ISC BIND nameserver contains a vulnerability that could allow a remote attacker to cause a denial of service.


According to ISC:

Adding certain types of signed negative responses to cache doesn't clear any matching RRSIG records already in cache. A subsequent lookup of the cached data can cause named to crash (INSIST).


A remote attacker could cause the name server on an affected system to crash. ISC notes that this vulnerability affects recursive nameservers irrespective of whether DNSSEC validation is enabled or disabled.


Apply an update

Users who obtain BIND from a third-party vendor, such as their operating system vendor, should see the vendor information portion of this document for a partial list of affected vendors.

This vulnerability is addressed in ISC BIND versions 9.4-ESV-R4, 9.6.2-P3, 9.6-ESV-R3, and 9.7.2-P3. Users of BIND from the original source distribution should upgrade to one of these versions, as appropriate.

See also

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Internet Systems ConsortiumAffected-01 Dec 2010
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Internet Systems Consortium for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

  • CVE IDs: CVE-2010-3613
  • Date Public: 01 Dec 2010
  • Date First Published: 01 Dec 2010
  • Date Last Updated: 16 Dec 2010
  • Severity Metric: 7.65
  • Document Revision: 22


If you have feedback, comments, or additional information about this vulnerability, please send us email.