{"id":"CVE-2018-5740","details":"\"deny-answer-aliases\" is a little-used feature intended to help recursive server operators protect end users against DNS rebinding attacks, a potential method of circumventing the security model used by client browsers. However, a defect in this feature makes it easy, when the feature is in use, to experience an assertion failure in name.c. Affects BIND 9.7.0-\u003e9.8.8, 9.9.0-\u003e9.9.13, 9.10.0-\u003e9.10.8, 9.11.0-\u003e9.11.4, 9.12.0-\u003e9.12.2, 9.13.0-\u003e9.13.2.","modified":"2026-05-18T05:49:05.200251222Z","published":"2019-01-16T20:29:01.017Z","related":["CGA-qq9v-cqj3-vrq9","SUSE-SU-2019:1407-1","SUSE-SU-2019:14074-1","SUSE-SU-2019:1449-1","SUSE-SU-2019:2502-1","openSUSE-SU-2019:1533-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"],"vendor_product":"canonical:ubuntu_linux","source":"CPE_FIELD","extracted_events":[{"last_affected":"12.04"},{"last_affected":"14.04"},{"last_affected":"16.04"},{"last_affected":"18.04"}]},{"extracted_events":[{"last_affected":"8.0"},{"last_affected":"9.0"}],"vendor_product":"debian:debian_linux","source":"CPE_FIELD","cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"]},{"extracted_events":[{"last_affected":"15.0"},{"last_affected":"15.1"},{"last_affected":"42.3"}],"vendor_product":"opensuse:leap","source":"CPE_FIELD","cpes":["cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"]},{"extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"vendor_product":"redhat:enterprise_linux_desktop","source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"]},{"extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"vendor_product":"redhat:enterprise_linux_server","source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"]},{"extracted_events":[{"last_affected":"7.6"}],"vendor_product":"redhat:enterprise_linux_server_aus","source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"]},{"extracted_events":[{"last_affected":"7.5"},{"last_affected":"7.6"}],"vendor_product":"redhat:enterprise_linux_server_eus","source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"]},{"extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"vendor_product":"redhat:enterprise_linux_workstation","source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"]}]},"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00027.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/105055"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1041436"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2570"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2571"},{"type":"ADVISORY","url":"https://kb.isc.org/docs/aa-01639"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/08/msg00033.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201903-13"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20180926-0003/"},{"type":"ADVISORY","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03927en_us"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3769-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3769-2/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/isc-projects/bind9","events":[{"introduced":"e3734ed6d178397992a7f354f75d3a8db785857c"},{"fixed":"8fc2e36186691698d247ab040b83793a9189de73"},{"introduced":"3514c49b2fbcdf95b2735878e2487fce9a3ddad5"},{"fixed":"3f3dd451af293119716d912c77a6da5918bf523a"},{"introduced":"63fbb3ea39094353765c04a6066b9e1d1013992a"},{"fixed":"12f71327ff796ed24752a4286fc0b3d9b21a4a57"},{"introduced":"1477c19dd9a347ee19a42dac227f299a4680506f"},{"fixed":"2fe4344de48d6061bef5a4000066a99a7c1296a6"},{"introduced":"71a40862c0be867999867cd99e21c2266a5e452b"},{"fixed":"3631aeb0709b460afc66ca8bff609bf93ef24bec"},{"introduced":"29b3a7d84240a51099490c0f39ae537f4e0d6a7a"},{"fixed":"4f6ef2f3e5bacd74da2cf2e4f8e51f3d7682b9a1"}],"database_specific":{"cpe":"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"9.7.0"},{"fixed":"9.8.8"},{"introduced":"9.9.0"},{"fixed":"9.9.13"},{"introduced":"9.10.0"},{"fixed":"9.10.8"},{"introduced":"9.11.0"},{"fixed":"9.11.4"},{"introduced":"9.12.0"},{"fixed":"9.12.2"},{"introduced":"9.13.0"},{"fixed":"9.13.2"}]}}],"versions":["v9.9.13rc2","v9.11.4rc2","v9.13.0","v9.9.12rc1","v9.11.3rc1","v9.9.12b1","v9.11.3b1","v9.9.11rc1","v9.11.2rc1","v9.9.11b1","v9.11.2b1","v9.9.10","v9.11.1","v9.9.10rc3","v9.11.1rc3","v9.9.10rc2","v9.11.1rc2","v9.9.10rc1","v9.11.1rc1","v9.9.10b1","v9.11.1b1","v9.11.0","v9.9.9","v9.9.9rc1","v9.9.9b2","v9.9.9b1","v9.9.8","v9.9.8rc1","v9.9.8b1","v9.9.7","v9.9.7rc2","v9.9.7rc1","v9.9.7b1","v9.9.6","v9.9.6rc2","v9.9.6rc1","v9.9.6b2","v9.9.6b1","v9.9.5","v9.9.5rc2","v9.9.5rc1","v9.9.5b1","v9.9.4","v9.9.4rc2","v9.9.4b1","v9.9.3","v9.9.3rc2","v9.9.3rc1","v9.9.3b2","v9.9.3b1","v9.9.2rc1","v9.9.2b1","v9.9.1","v9.9.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-5740.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.isc.org/isc-projects/bind9","events":[{"introduced":"e3734ed6d178397992a7f354f75d3a8db785857c"},{"fixed":"8fc2e36186691698d247ab040b83793a9189de73"},{"introduced":"3514c49b2fbcdf95b2735878e2487fce9a3ddad5"},{"fixed":"3f3dd451af293119716d912c77a6da5918bf523a"},{"introduced":"63fbb3ea39094353765c04a6066b9e1d1013992a"},{"fixed":"12f71327ff796ed24752a4286fc0b3d9b21a4a57"},{"introduced":"1477c19dd9a347ee19a42dac227f299a4680506f"},{"fixed":"2fe4344de48d6061bef5a4000066a99a7c1296a6"},{"introduced":"71a40862c0be867999867cd99e21c2266a5e452b"},{"fixed":"3631aeb0709b460afc66ca8bff609bf93ef24bec"},{"introduced":"29b3a7d84240a51099490c0f39ae537f4e0d6a7a"},{"fixed":"4f6ef2f3e5bacd74da2cf2e4f8e51f3d7682b9a1"}],"database_specific":{"cpe":"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"9.7.0"},{"fixed":"9.8.8"},{"introduced":"9.9.0"},{"fixed":"9.9.13"},{"introduced":"9.10.0"},{"fixed":"9.10.8"},{"introduced":"9.11.0"},{"fixed":"9.11.4"},{"introduced":"9.12.0"},{"fixed":"9.12.2"},{"introduced":"9.13.0"},{"fixed":"9.13.2"}]}}],"versions":["v9.9.13rc2","v9.11.4rc2","v9.13.0","v9.9.12rc1","v9.11.3rc1","v9.9.12b1","v9.11.3b1","v9.9.11rc1","v9.11.2rc1","v9.9.11b1","v9.11.2b1","v9.9.10","v9.11.1","v9.9.10rc3","v9.11.1rc3","v9.9.10rc2","v9.11.1rc2","v9.9.10rc1","v9.11.1rc1","v9.9.10b1","v9.11.1b1","v9.11.0","v9.9.9","v9.9.9rc1","v9.9.9b2","v9.9.9b1","v9.9.8","v9.9.8rc1","v9.9.8b1","v9.9.7","v9.9.7rc2","v9.9.7rc1","v9.9.7b1","v9.9.6","v9.9.6rc2","v9.9.6rc1","v9.9.6b2","v9.9.6b1","v9.9.5","v9.9.5rc2","v9.9.5rc1","v9.9.5b1","v9.9.4","v9.9.4rc2","v9.9.4b1","v9.9.3","v9.9.3rc2","v9.9.3rc1","v9.9.3b2","v9.9.3b1","v9.9.2rc1","v9.9.2b1","v9.9.1","v9.9.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-5740.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}