ISC BIND 9.0.x, 9.1.x, 9.2.0 up to 9.2.7, 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (exit) via a type * (ANY) DNS query response that contains multiple RRsets, which triggers an assertion error, aka the "DNSSEC Validation" vulnerability.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:26
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc - | |
References | () http://docs.info.apple.com/article.html?artnum=305530 - | |
References | () http://fedoranews.org/cms/node/2507 - | |
References | () http://fedoranews.org/cms/node/2537 - | |
References | () http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc - | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495 - | |
References | () http://lists.apple.com/archives/security-announce/2007/May/msg00004.html - | |
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html - | |
References | () http://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.html - | |
References | () http://marc.info/?l=bind-announce&m=116968519300764&w=2 - | |
References | () http://secunia.com/advisories/23904 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/23924 - Vendor Advisory | |
References | () http://secunia.com/advisories/23943 - Vendor Advisory | |
References | () http://secunia.com/advisories/23944 - Vendor Advisory | |
References | () http://secunia.com/advisories/23972 - Vendor Advisory | |
References | () http://secunia.com/advisories/23974 - Vendor Advisory | |
References | () http://secunia.com/advisories/23977 - Vendor Advisory | |
References | () http://secunia.com/advisories/24014 - Vendor Advisory | |
References | () http://secunia.com/advisories/24048 - Vendor Advisory | |
References | () http://secunia.com/advisories/24054 - Vendor Advisory | |
References | () http://secunia.com/advisories/24083 - Vendor Advisory | |
References | () http://secunia.com/advisories/24129 - Vendor Advisory | |
References | () http://secunia.com/advisories/24203 - Vendor Advisory | |
References | () http://secunia.com/advisories/24284 - | |
References | () http://secunia.com/advisories/24648 - Vendor Advisory | |
References | () http://secunia.com/advisories/24930 - Vendor Advisory | |
References | () http://secunia.com/advisories/24950 - Vendor Advisory | |
References | () http://secunia.com/advisories/25402 - Vendor Advisory | |
References | () http://secunia.com/advisories/25482 - | |
References | () http://secunia.com/advisories/25649 - | |
References | () http://secunia.com/advisories/25715 - | |
References | () http://secunia.com/advisories/26909 - | |
References | () http://secunia.com/advisories/27706 - | |
References | () http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc - | |
References | () http://security.gentoo.org/glsa/glsa-200702-06.xml - | |
References | () http://securitytracker.com/id?1017573 - | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.494157 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102969-1 - | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2007-125.htm - | |
References | () http://www-1.ibm.com/support/docview.wss?uid=isg1IY95618 - | |
References | () http://www-1.ibm.com/support/docview.wss?uid=isg1IY95619 - | |
References | () http://www-1.ibm.com/support/docview.wss?uid=isg1IY96144 - | |
References | () http://www-1.ibm.com/support/docview.wss?uid=isg1IY96324 - | |
References | () http://www.debian.org/security/2007/dsa-1254 - | |
References | () http://www.isc.org/index.pl?/sw/bind/bind-security.php - | |
References | () http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8 - Patch | |
References | () http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4 - Patch | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:030 - | |
References | () http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0044.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0057.html - | |
References | () http://www.securityfocus.com/bid/22231 - | |
References | () http://www.trustix.org/errata/2007/0005 - | |
References | () http://www.ubuntu.com/usn/usn-418-1 - | |
References | () http://www.vupen.com/english/advisories/2007/1401 - | |
References | () http://www.vupen.com/english/advisories/2007/1939 - | |
References | () http://www.vupen.com/english/advisories/2007/2002 - | |
References | () http://www.vupen.com/english/advisories/2007/2163 - | |
References | () http://www.vupen.com/english/advisories/2007/2245 - | |
References | () http://www.vupen.com/english/advisories/2007/2315 - | |
References | () http://www.vupen.com/english/advisories/2007/3229 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/31838 - | |
References | () https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488 - | |
References | () https://issues.rpath.com/browse/RPL-989 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11523 - | |
References | () https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144 - |
Information
Published : 2007-01-25 20:28
Updated : 2024-11-21 00:26
NVD link : CVE-2007-0494
Mitre link : CVE-2007-0494
CVE.ORG link : CVE-2007-0494
JSON object : View
Products Affected
isc
- bind
CWE
CWE-19
Data Processing Errors