BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via certain SIG queries, which cause an assertion failure when multiple RRsets are returned.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
15 Feb 2024, 21:04
Type | Values Removed | Values Added |
---|---|---|
First Time |
Canonical
Canonical ubuntu Linux Apple Apple mac Os X Apple mac Os X Server |
|
CWE | CWE-617 | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CPE | cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:* |
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:* |
References | (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.481241 - Broken Link | |
References | (OPENBSD) http://www.openbsd.org/errata.html - Release Notes | |
References | (UBUNTU) http://www.ubuntu.com/usn/usn-343-1 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/21912 - Broken Link | |
References | (CONFIRM) http://docs.info.apple.com/article.html?artnum=305530 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/21818 - Broken Link | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-200609-11.xml - Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2006/3473 - Broken Link | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/445600/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/21828 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/21838 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/22298 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/21786 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/21926 - Broken Link | |
References | (CONFIRM) https://issues.rpath.com/browse/RPL-626 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/21752 - Broken Link | |
References | (HP) https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144 - Broken Link | |
References | (APPLE) http://lists.apple.com/archives/security-announce/2007/May/msg00004.html - Mailing List | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2006:163 - Broken Link | |
References | (SUSE) http://www.novell.com/linux/security/advisories/2006_24_sr.html - Broken Link | |
References | (CERT-VN) http://www.kb.cert.org/vuls/id/915404 - Patch, Third Party Advisory, US Government Resource | |
References | (MISC) http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en - Broken Link, Patch | |
References | (OPENPKG) http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/24950 - Broken Link | |
References | (DEBIAN) http://www.us.debian.org/security/2006/dsa-1172 - Broken Link | |
References | (SUSE) http://www.novell.com/linux/security/advisories/2006_23_sr.html - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/25402 - Broken Link | |
References | (SECTRACK) http://securitytracker.com/id?1016794 - Broken Link, Third Party Advisory, VDB Entry | |
References | (VUPEN) http://www.vupen.com/english/advisories/2007/1939 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/21835 - Broken Link | |
References | (VUPEN) http://www.vupen.com/english/advisories/2007/1401 - Broken Link | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/28745 - Third Party Advisory, VDB Entry | |
References | (FREEBSD) http://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/21816 - Broken Link | |
References | (BID) http://www.securityfocus.com/bid/19859 - Broken Link, Third Party Advisory, VDB Entry |
Information
Published : 2006-09-06 00:04
Updated : 2024-02-28 10:42
NVD link : CVE-2006-4095
Mitre link : CVE-2006-4095
CVE.ORG link : CVE-2006-4095
JSON object : View
Products Affected
canonical
- ubuntu_linux
isc
- bind
apple
- mac_os_x_server
- mac_os_x
CWE
CWE-617
Reachable Assertion