The BIND 9 Security Vulnerability Matrix is a tool to help DNS operators understand the current security risk for a given version of BIND.
It has two parts:
- The first part is a table listing all of the vulnerabilities covered by this page. The first column is a reference number for use in the tables in the second part. The second column is the CVE (Common Vulnerabilities and Exposure) number for the vulnerability, linked to its page on cve.mitre.org. The third column is a short description of the vulnerability, linked (where possible) to our Knowledge Base article on the vulnerability.
- The second part is a table for each branch of BIND, listing all of the releases in that branch along the side and vulnerabilities along the top. If a vulnerability number is less than the lowest column heading, that branch does not have any versions with it. If a vulnerability number is greater than the highest column heading, that branch has not been tested and should be assumed to be vulnerable.
For example, if you use the top table to look up CVE-2012-1667, you will see that it cross references to #46. You can look for column #46 in the lower charts and see which versions are vulnerable. If you were still running BIND 9.8.3 you would know to upgrade.
We do not generally list alpha, beta or release candidate (RC) versions here, and recommend that you use only released software in any environment in which security could be an issue. This page explains our version numbering system.
We do not recommend that you use any version not listed in one of these charts.
Vulnerability information for EOL (End of Life) versions of BIND 9 (9.0 through 9.8) and below are included only for vulnerabilities discovered before (or in some cases shortly after) the EOL date. These versions are all known to be affected by some vulnerabilities discovered after their EOL date.
Using obsolete versions of BIND
We recommend that you not use obsolete versions of any ISC software. It was updated for a reason. But there is one situation in which you really must not run older versions of BIND.
If a nameserver — any nameserver, whether BIND or other software — is configured to use "forwarders'', then none of its targets (the servers to which it forwards the requests) can be running BIND4 or BIND8. Upgrade all nameservers used as forwarders to a current version. There is a wide scale Kashpureff-style DNS cache corruption attack that depends on BIND4 and BIND8 being the targets of DNS forwarders. Both BIND 4 and BIND 8 have end-of-life status.
Listing of Vulnerabilities
These matrices have been moved to our Knowledge Base from our website. Along the way we have extracted the security matrix information for BIND8; hence the numbering does not start with 1, and there are some gaps where some security reports related solely to BIND8. If you are still running BIND8 or earlier, we strongly recommend that you upgrade because there are security vulnerabilities inherent in BIND8 that could not be fixed until BIND9.
BIND 9.10
|
ver/CVE |
58 |
59
|
60
|
61 |
62
|
63
|
64
|
65
|
66
|
67
|
68
|
69
|
70
|
71
| 72 | 73
| 74 |
9.10.3-P4
| | | | | | | | | | | | | | | | | |
9.10.3-P3
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| +
| +
| +
|
9.10.3-P2
|
|
|
|
|
|
|
|
|
|
|
|
+
|
+
|
| +
| +
| + |
9.10.3-P1
|
|
|
|
|
|
|
|
|
|
|
+
|
+
|
+
|
| +
| +
| +
|
9.10.3
|
|
|
|
|
|
|
|
|
|
+ |
+
|
+
|
+
|
| +
| +
| +
|
9.10.2-P4
|
|
|
|
|
|
|
|
|
|
+ |
|
+
|
+
|
| +
| +
| +
|
9.10.2-P3
|
|
|
|
|
|
|
|
+
|
+
|
+
|
|
+
|
+
|
| +
| +
| +
|
9.10.2-P2
|
|
|
|
|
|
|
+
|
+
|
+
|
+ |
|
+
|
+
|
| +
| +
| +
|
|
9.10.2-P1 |
|
|
|
|
|
+
|
+
|
+
|
+
|
+ |
|
+
|
+
|
| +
| +
| +
|
9.10.2
|
|
|
|
|
|
+
|
+
|
+
|
+
|
+ |
|
+
|
+
|
| +
| +
| +
|
9.10.1-P2
|
|
|
|
|
|
+
|
+
|
+
|
|
+ |
|
+
|
+
|
| +
| +
| +
|
9.10.1-P1
|
|
|
|
|
+ |
+
|
+
|
+
|
|
+ |
|
+
|
+
|
| +
| +
| +
|
|
9.10.1 |
|
|
+
|
+
|
+ |
+
|
+
|
+
|
|
+ |
|
+
|
+
|
| +
| +
| +
|
|
9.10.0-P2 |
|
|
+
|
+
|
+ |
+
|
+
|
+
|
|
+ |
|
+
|
+
|
| +
| +
| +
|
9.10.0-P1
|
|
+ |
+
|
+
|
+ |
+
|
+
|
+
|
|
+ |
|
+
|
+
|
| +
| +
| +
|
|
9.10.0 |
+ |
+ |
+ |
+
|
+ |
+
|
+
|
+
|
|
+ |
|
+
|
+
|
| +
| +
| +
|
BIND 9.9
|
ver/CVE |
46 |
47 |
48 |
49 |
50 |
51 |
52 |
53 |
54
|
55
|
56 |
57 |
58 |
59
|
60 |
61 |
62
|
63
|
64
|
65
|
66
|
67
|
68
|
69
|
70
|
71
| 72 | 73 | 74 |
9.9.8-P4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
9.9.8-P3
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| +
| +
| |
9.9.8-P2
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
|
| +
| +
| |
9.9.8-P1
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
+
|
|
| +
| +
| |
9.9.8
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
+
|
+
|
|
| +
| +
| |
9.9.7-P3
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
|
+
|
|
| +
| +
| |
9.9.7-P2
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
9.9.7-P1
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
9.9.7
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
9.9.6-P2
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
9.9.6-P1
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.6 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.5-P1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.5-W1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.4-P2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.4-P1 |
|
|
|
|
|
|
|
|
|
|
|
+ |
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
9.9.4
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.3-P2 |
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.3-P1 |
|
|
|
|
|
|
|
|
|
+ |
+ |
+ |
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.3 |
|
|
|
|
|
|
|
|
+ |
+ |
+ |
+ |
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.2-P2 |
|
|
|
|
|
|
+ |
|
|
+ |
+ |
+ |
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.2-P1 |
|
|
|
|
|
|
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.2 |
|
|
|
|
|
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.1-P4 |
|
|
|
|
|
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.1-P3 |
|
|
|
|
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.1-P2 |
|
|
|
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.1-P1 |
|
+ |
+ |
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.1 |
+ |
+ |
+ |
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.0 |
+ |
+ |
+ |
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
+ |
+
|
+
|
+
|
|
+
|
|
+
|
|
| +
| +
| |
BIND 9.9 Supported Preview edition
If you'd like more information on our product support or about our Supported Preview edition of BIND, also known as the Subscription version, please visit https://www.isc.org/bind-subscription-2/
|
ver/CVE |
54
|
55
|
56 |
57
|
58
|
59 |
60 |
61 |
62 |
63
|
64 |
65
|
66
|
67
|
68
|
69
|
70
|
71
| 72
| 73 | 74
|
9.9.8-S6
| | | | | | | | | | | | | | | | | | | | | |
9.9.8-S5
| | | | | | | | | | | | | | | | | | | +
| +
| |
9.9.8-S4
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
| +
| +
| |
9.9.8-S3
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
|
+
| +
| +
| |
9.9.8-S2
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
+
|
|
+
| +
| +
| |
9.9.8-S1
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
+
|
+
|
|
+
| +
| +
| |
9.9.7-S6
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
|
+
|
|
| +
| +
| |
9.9.7-S5
|
|
|
|
|
|
|
|
|
|
|
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
9.9.7-S4
|
|
|
|
|
|
|
|
|
|
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
9.9.7-S3
|
|
|
|
|
|
|
|
|
|
+
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
9.9.7-S2
|
|
|
|
|
|
|
|
|
|
+
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
9.9.7-S1
|
|
|
|
|
|
|
|
|
|
+
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
9.9.6-S3
|
|
|
|
|
|
|
|
|
|
+
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.6-S2 |
|
|
|
|
|
|
|
|
+ |
+
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.6-S1 |
|
|
|
|
|
|
+
|
+
|
+ |
+
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.5-S1-P1 |
|
|
|
|
|
|
+
|
+
|
+ |
+
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
9.9.5-S1-W1
|
|
|
|
|
|
|
+
|
+
|
+ |
+
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.5-S1 |
|
|
|
|
|
|
+
|
+
|
+ |
+
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.4-S1-P2 |
|
|
|
|
|
|
+
|
+
|
+ |
+
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
9.9.4-S1-P1
|
|
|
|
+ |
|
|
+
|
+
|
+ |
+
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.4-S1 |
|
|
+ |
+ |
|
|
+
|
+
|
+ |
+
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.3-S1-P1 |
|
|
+ |
+ |
|
|
+
|
+
|
+ |
+
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
|
9.9.3-S1 |
|
+ |
+ |
+ |
|
|
+
|
+
|
+ |
+
|
+
|
+
|
+
|
+
|
|
+
|
|
| +
| +
| |
While there may be some newer vulnerabilities that do not apply to them, they are all affected by multiple known vulnerabilities.
BIND 9.8
(EOL September 2014; final matrix update 2014-12-08)
|
ver/CVE |
41 |
42 |
43 |
44 |
45 |
46 |
47 |
48 |
49 |
50 |
51 |
52 |
53 |
54
|
55
|
56 |
57
|
58
|
59
|
60 |
61 |
|
9.8.8 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
|
|
9.8.7-P1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
|
|
9.8.7 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
|
|
9.8.6-P2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
|
9.8.6-P1
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
|
+
|
|
|
9.8.6 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.8.5-P2
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.8.5-P1
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
+ |
|
|
+
|
|
|
9.8.5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
+ |
+ |
|
|
+
|
|
|
9.8.4-P2 |
|
|
|
|
|
|
|
|
|
|
|
+ |
|
|
+ |
+ |
+ |
|
|
+
|
|
|
9.8.4-P1 |
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
|
9.8.4 |
|
|
|
|
|
|
|
|
|
|
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
|
9.8.3-P4 |
|
|
|
|
|
|
|
|
|
|
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
|
9.8.3-P3 |
|
|
|
|
|
|
|
|
|
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
|
9.8.3-P2 |
|
|
|
|
|
|
|
|
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
|
9.8.3-P1 |
|
|
|
|
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
|
9.8.3 |
|
|
|
|
|
+ |
+ |
|
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
|
9.8.2 |
|
|
|
|
|
+ |
+ |
|
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
|
9.8.1-P1 |
|
|
|
|
|
+ |
+ |
|
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
|
9.8.1 |
|
|
|
|
+ |
+ |
+ |
|
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
|
9.8.0-P4 |
|
|
|
|
+ |
+ |
+ |
|
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
|
9.8.0-P3 |
|
|
+ |
|
+ |
+ |
+ |
|
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
|
9.8.0-P2 |
|
|
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+
|
|
|
9.8.0-P1 |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+ |
|
|
9.8.0 |
+ |
+ |
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
+ |
|
|
+ |
|
BIND 9.7
(EOL November 2012; Final matrix update 2014-01-13)
|
ver/CVE |
34 |
35 |
36 |
37 |
38 |
39 |
40 |
41 |
42 |
43 |
44 |
45 |
46 |
47 |
48 |
49 |
50 |
51 |
52 |
53 |
54
|
55
|
56 |
57
|
|
9.7.7 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
+ |
+ |
+ |
|
9.7.6-P4 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
+ |
+ |
+ |
|
9.7.6-P3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.6-P2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.6-P1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.6 |
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.5 |
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.4-P1 |
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.4 |
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
+ |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.3-P3 |
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
+ |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.3-P2 |
|
|
|
|
|
|
|
|
|
+ |
|
+ |
+ |
+ |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.3-P1 |
|
|
|
|
|
|
|
|
|
+ |
|
+ |
+ |
+ |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.3 |
|
|
|
|
|
|
|
|
+ |
+ |
|
+ |
+ |
+ |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.2-P3 |
|
|
|
|
|
|
+ |
|
+ |
+ |
|
+ |
+ |
+ |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.2-P2 |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
+ |
+ |
|
+ |
+ |
+ |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.2-P1 |
|
+ |
+ |
+ |
|
+ |
+ |
|
+ |
+ |
|
+ |
+ |
+ |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.2 |
|
+ |
+ |
+ |
|
+ |
+ |
|
+ |
+ |
|
+ |
+ |
+ |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.1-P2 |
|
|
+ |
+ |
|
+ |
+ |
|
+ |
+ |
|
+ |
+ |
+ |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.1-P1 |
+ |
|
+ |
+ |
|
+ |
+ |
|
+ |
+ |
|
+ |
+ |
+ |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.1 |
+ |
|
+ |
+ |
|
+ |
+ |
|
+ |
+ |
|
+ |
+ |
+ |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.0-P2 |
|
|
+ |
+ |
|
+ |
|
|
|
+ |
|
+ |
+ |
|
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.0-P1 |
|
|
+ |
+ |
|
+ |
|
|
|
+ |
|
+ |
+ |
|
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
|
9.7.0 |
|
|
+ |
+ |
|
+ |
|
|
|
+ |
|
+ |
+ |
|
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
BIND 9.6 / 9.6-ESV
(EOL February 2014; final matrix update 2014-12-08)
|
ver/CVE |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
38 |
39 |
40 |
41 |
42 |
43 |
44 |
45 |
46 |
47 |
48 |
49 |
50 |
51 |
52 |
53 |
54
|
55
|
56 |
57
|
58 |
59
|
60 |
|
9.6-ESV-R11 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
|
9.6-ESV-R10-P2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
|
9.6-ESV-R10-P1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
|
+
|
|
9.6-ESV-R10 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R9-P1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R9 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R8 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R7-P4 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R7-P3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R7-P2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R7-P1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R7 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R6 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R5-P1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
+ |
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R4-P3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
+ |
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R4-P2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
+ |
+ |
+ |
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R4-P1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
+ |
+ |
+ |
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R4 |
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
+ |
+ |
+ |
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R3 |
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
|
+ |
+ |
+ |
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R2 |
|
|
|
|
|
|
|
+ |
|
+ |
|
|
+ |
|
|
+ |
+ |
+ |
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV-R1 |
|
|
|
|
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
+ |
+ |
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6-ESV |
|
|
|
|
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
+ |
+
|
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6.3 |
|
|
|
|
|
|
|
+ |
|
+ |
|
|
+ |
|
|
+ |
+ |
|
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6.2-P3 |
|
|
|
|
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
+ |
|
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6.2-P2 |
|
|
|
|
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
+ |
|
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6.2-P1 |
|
|
|
|
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
+ |
|
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6.2 |
|
|
|
|
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
+ |
|
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6.1-P3 |
|
|
|
|
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
+ |
|
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6.1-P2 |
|
|
|
|
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
+ |
|
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6.1-P1 |
|
|
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
+ |
|
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6.1 |
|
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
+ |
|
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6.0-P1 |
|
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
+ |
|
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
|
9.6.0 |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
+ |
|
|
+ |
+ |
|
|
|
|
|
+ |
+ |
|
|
+
|
BIND 9.5
(EOL September 2010; Final matrix update 2011-11-16)
|
ver/CVE |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
38 |
39 |
40 |
41 |
42 |
43 |
44 |
45 |
|
9.5.2-P2 |
|
|
|
|
|
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.5.1-P3 |
|
|
|
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.5.1-P1 |
|
|
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.5.1 |
|
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.5.0-P2 |
|
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.5.0-P1 |
|
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.5.0 |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
BIND 9.4 / 9.4-ESV
(EOL March 2012; Final matrix update 2011-11-16)
|
ver/CVE |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
38 |
39 |
40 |
41 |
42 |
43 |
44 |
45 |
|
9.4-ESV-R5-P1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
9.4-ESV-R5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
9.4-ESV-R4-P1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
|
9.4-ESV-R4 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
|
+ |
|
9.4-ESV-R3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
+ |
|
|
+ |
|
|
+ |
|
9.4-ESV-R2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.4-ESV-R1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.4-ESV |
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.4.3-P5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.4.3-P3 |
|
|
|
|
|
|
|
|
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.4.3-P1 |
|
|
|
|
|
|
|
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.4.3 |
|
|
|
|
|
|
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.4.2-P1 |
|
|
|
|
+ |
|
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.4.2 |
|
|
|
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.4.1-P1 |
|
|
|
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.4.1 |
|
+ |
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
|
9.4.0 |
+ |
+ |
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
+ |
BIND 9.3
(EOL January 2009; Final matrix update 2011-09-09)
|
ver/CVE |
19
|
21 |
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
38 |
39 |
40 |
41 |
42 |
43 |
44 |
|
9.3.6-P1 |
|
|
|
|
|
|
|
|
|
|
|
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.3.6 |
|
|
|
|
|
|
|
|
|
|
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.3.5-P1 |
|
|
|
|
|
|
|
|
|
|
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.3.5 |
|
|
|
|
|
|
|
|
|
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.3.4-P1 |
|
|
|
|
|
|
|
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.3.4 |
|
|
|
|
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.3.3 |
|
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.3.2 |
|
+ |
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.3.1 |
|
+ |
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.3.0 |
+ |
+ |
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
BIND 9.2
(EOL September 2007; Final matrix update 2011-09-09)
|
ver/CVE |
13
|
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
38 |
39 |
40 |
41 |
42 |
43 |
44 |
|
9.2.8-P1 |
|
|
|
|
|
|
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.2.8 |
|
|
|
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.2.7 |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.2.6 |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.2.5 |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.2.4 |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.2.3 |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.2.2 |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.2.1 |
|
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.2.0 |
+ |
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
BIND 9.1
(EOL July 2001; Final matrix update 2011-09-09)
|
ver/CVE |
13
|
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
38 |
39 |
40 |
41 |
42 |
43 |
44 |
|
9.1.3 |
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.1.2 |
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.1.1 |
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.1.0 |
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
BIND 9.0
(EOL July 2001; Final matrix update 2011-09-09)
|
ver/CVE |
13
|
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
38 |
39 |
40 |
41 |
42 |
43 |
44 |
|
9.0.1 |
+ |
+ |
|
|
+ |
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
|
9.0.0 |
+ |
+ |
|
|
|
|
+ |
+ |
+ |
+ |
+ |
+ |
|
|
|
+ |
|
+ |
|
|
|
|
|
© 2001-2016 Internet Systems Consortium
Please help us to improve the content of our knowledge base by letting us know below how we can improve this article.
If you have a technical question or problem on which you'd like help, please don't submit it here as article feedback.
For assistance with problems and questions for which you have not been able to find an answer in our Knowledge Base, we recommend searching our community mailing list archives and/or posting your question there (you will need to register there first for your posts to be accepted). The bind-users and the dhcp-users lists particularly have a long-standing and active membership.
ISC relies on the financial support of the community to fund the development of its open source software products. If you would like to support future product evolution and maintenance as well having peace of mind knowing that our team of experts are poised to provide you with individual technical assistance whenever you call upon them, then please consider our Professional Subscription Support services - details can be found on our main website.
Sorry about that - we've fixed the link!