{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T15:17:44.443","vulnerabilities":[{"cve":{"id":"CVE-2018-5734","sourceIdentifier":"security-officer@isc.org","published":"2019-01-16T20:29:00.800","lastModified":"2024-11-21T04:09:16.740","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"While handling a particular type of malformed packet BIND erroneously selects a SERVFAIL rcode instead of a FORMERR rcode. If the receiving view has the SERVFAIL cache feature enabled, this can trigger an assertion failure in badcache.c when the request doesn't contain all of the expected information. Affects BIND 9.10.5-S1 to 9.10.5-S4, 9.10.6-S1, 9.10.6-S2."},{"lang":"es","value":"Al gestionar un tipo concreto de paquete mal formado, BIND selecciona erróneamente un rcode SERVFAIL en lugar de un rcode FORMERR. Si la vista que se está recibiendo tiene la característica de caché SERVFAIL habilitada, esto puede desencadenar un fallo de aserción en badcache.c cuando la petición no contiene toda la información esperada. Afecta a BIND desde la versión 9.9.5-S1 hasta la 9.10.5-S4 y desde la versión 9.10.6-S1 hasta la 9.10.6-S2."}],"metrics":{"cvssMetricV30":[{"source":"security-officer@isc.org","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-617"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*","matchCriteriaId":"82A6F259-EB06-4F31-9F68-A76F257756DC"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.10.5:s4:*:*:*:*:*:*","matchCriteriaId":"5AB5FCA2-A2DE-4D8D-A00C-680DE0DAF83F"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.10.6:s1:*:*:*:*:*:*","matchCriteriaId":"9B6C3FDB-B57C-4DF5-AFDB-EEF17F5DAE08"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.10.6:s2:*:*:*:*:*:*","matchCriteriaId":"7C057426-87E6-4B56-A9F2-07BEDBE4A241"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","matchCriteriaId":"E0C4B1E5-75BF-43AE-BBAC-0DD4124C71ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*","matchCriteriaId":"6AD8D649-8F3E-4B22-912C-FE94CDC88A67"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/103189","source":"security-officer@isc.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1040438","source":"security-officer@isc.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://kb.isc.org/docs/aa-01562","source":"security-officer@isc.org","tags":["Vendor Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20180926-0005/","source":"security-officer@isc.org","tags":["Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/103189","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1040438","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://kb.isc.org/docs/aa-01562","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20180926-0005/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}