CVE-2006-4095

BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via certain SIG queries, which cause an assertion failure when multiple RRsets are returned.
References
Link Resource
http://docs.info.apple.com/article.html?artnum=305530 Broken Link
http://lists.apple.com/archives/security-announce/2007/May/msg00004.html Mailing List
http://secunia.com/advisories/21752 Broken Link
http://secunia.com/advisories/21786 Broken Link
http://secunia.com/advisories/21816 Broken Link
http://secunia.com/advisories/21818 Broken Link
http://secunia.com/advisories/21828 Broken Link
http://secunia.com/advisories/21835 Broken Link
http://secunia.com/advisories/21838 Broken Link
http://secunia.com/advisories/21912 Broken Link
http://secunia.com/advisories/21926 Broken Link
http://secunia.com/advisories/22298 Broken Link
http://secunia.com/advisories/24950 Broken Link
http://secunia.com/advisories/25402 Broken Link
http://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc Third Party Advisory
http://security.gentoo.org/glsa/glsa-200609-11.xml Third Party Advisory
http://securitytracker.com/id?1016794 Broken Link Third Party Advisory VDB Entry
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.481241 Broken Link
http://www.kb.cert.org/vuls/id/915404 Patch Third Party Advisory US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:163 Broken Link
http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en Broken Link Patch
http://www.novell.com/linux/security/advisories/2006_23_sr.html Broken Link
http://www.novell.com/linux/security/advisories/2006_24_sr.html Broken Link
http://www.openbsd.org/errata.html Release Notes
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html Broken Link
http://www.securityfocus.com/archive/1/445600/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/19859 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-343-1 Third Party Advisory
http://www.us.debian.org/security/2006/dsa-1172 Broken Link
http://www.vupen.com/english/advisories/2006/3473 Broken Link
http://www.vupen.com/english/advisories/2007/1401 Broken Link
http://www.vupen.com/english/advisories/2007/1939 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/28745 Third Party Advisory VDB Entry
https://issues.rpath.com/browse/RPL-626 Broken Link
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*

History

15 Feb 2024, 21:04

Type Values Removed Values Added
First Time Canonical
Canonical ubuntu Linux
Apple
Apple mac Os X
Apple mac Os X Server
CWE NVD-CWE-Other CWE-617
CVSS v2 : 5.0
v3 : unknown
v2 : 5.0
v3 : 7.5
CPE cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
References (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.481241 - (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.481241 - Broken Link
References (OPENBSD) http://www.openbsd.org/errata.html - (OPENBSD) http://www.openbsd.org/errata.html - Release Notes
References (UBUNTU) http://www.ubuntu.com/usn/usn-343-1 - (UBUNTU) http://www.ubuntu.com/usn/usn-343-1 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/21912 - (SECUNIA) http://secunia.com/advisories/21912 - Broken Link
References (CONFIRM) http://docs.info.apple.com/article.html?artnum=305530 - (CONFIRM) http://docs.info.apple.com/article.html?artnum=305530 - Broken Link
References (SECUNIA) http://secunia.com/advisories/21818 - (SECUNIA) http://secunia.com/advisories/21818 - Broken Link
References (GENTOO) http://security.gentoo.org/glsa/glsa-200609-11.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-200609-11.xml - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2006/3473 - (VUPEN) http://www.vupen.com/english/advisories/2006/3473 - Broken Link
References (BUGTRAQ) http://www.securityfocus.com/archive/1/445600/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/445600/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/21828 - (SECUNIA) http://secunia.com/advisories/21828 - Broken Link
References (SECUNIA) http://secunia.com/advisories/21838 - (SECUNIA) http://secunia.com/advisories/21838 - Broken Link
References (SECUNIA) http://secunia.com/advisories/22298 - (SECUNIA) http://secunia.com/advisories/22298 - Broken Link
References (SECUNIA) http://secunia.com/advisories/21786 - (SECUNIA) http://secunia.com/advisories/21786 - Broken Link
References (SECUNIA) http://secunia.com/advisories/21926 - (SECUNIA) http://secunia.com/advisories/21926 - Broken Link
References (CONFIRM) https://issues.rpath.com/browse/RPL-626 - (CONFIRM) https://issues.rpath.com/browse/RPL-626 - Broken Link
References (SECUNIA) http://secunia.com/advisories/21752 - (SECUNIA) http://secunia.com/advisories/21752 - Broken Link
References (HP) https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144 - (HP) https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144 - Broken Link
References (APPLE) http://lists.apple.com/archives/security-announce/2007/May/msg00004.html - (APPLE) http://lists.apple.com/archives/security-announce/2007/May/msg00004.html - Mailing List
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2006:163 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2006:163 - Broken Link
References (SUSE) http://www.novell.com/linux/security/advisories/2006_24_sr.html - (SUSE) http://www.novell.com/linux/security/advisories/2006_24_sr.html - Broken Link
References (CERT-VN) http://www.kb.cert.org/vuls/id/915404 - Patch, US Government Resource (CERT-VN) http://www.kb.cert.org/vuls/id/915404 - Patch, Third Party Advisory, US Government Resource
References (MISC) http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en - Patch (MISC) http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en - Broken Link, Patch
References (OPENPKG) http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html - (OPENPKG) http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html - Broken Link
References (SECUNIA) http://secunia.com/advisories/24950 - (SECUNIA) http://secunia.com/advisories/24950 - Broken Link
References (DEBIAN) http://www.us.debian.org/security/2006/dsa-1172 - (DEBIAN) http://www.us.debian.org/security/2006/dsa-1172 - Broken Link
References (SUSE) http://www.novell.com/linux/security/advisories/2006_23_sr.html - (SUSE) http://www.novell.com/linux/security/advisories/2006_23_sr.html - Broken Link
References (SECUNIA) http://secunia.com/advisories/25402 - (SECUNIA) http://secunia.com/advisories/25402 - Broken Link
References (SECTRACK) http://securitytracker.com/id?1016794 - (SECTRACK) http://securitytracker.com/id?1016794 - Broken Link, Third Party Advisory, VDB Entry
References (VUPEN) http://www.vupen.com/english/advisories/2007/1939 - (VUPEN) http://www.vupen.com/english/advisories/2007/1939 - Broken Link
References (SECUNIA) http://secunia.com/advisories/21835 - (SECUNIA) http://secunia.com/advisories/21835 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2007/1401 - (VUPEN) http://www.vupen.com/english/advisories/2007/1401 - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/28745 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/28745 - Third Party Advisory, VDB Entry
References (FREEBSD) http://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc - (FREEBSD) http://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/21816 - (SECUNIA) http://secunia.com/advisories/21816 - Broken Link
References (BID) http://www.securityfocus.com/bid/19859 - (BID) http://www.securityfocus.com/bid/19859 - Broken Link, Third Party Advisory, VDB Entry

Information

Published : 2006-09-06 00:04

Updated : 2024-02-28 10:42


NVD link : CVE-2006-4095

Mitre link : CVE-2006-4095

CVE.ORG link : CVE-2006-4095


JSON object : View

Products Affected

canonical

  • ubuntu_linux

isc

  • bind

apple

  • mac_os_x_server
  • mac_os_x
CWE
CWE-617

Reachable Assertion