CVE-2006-4095

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via certain SIG queries, which cause an assertion failure when multiple RRsets are returned.

References

http://docs.info.apple.com/article.html?artnum=305530

http://lists.apple.com/archives/security-announce/2007/May/msg00004.html

http://secunia.com/advisories/21752

http://secunia.com/advisories/21786

http://secunia.com/advisories/21816

http://secunia.com/advisories/21818

http://secunia.com/advisories/21828

http://secunia.com/advisories/21835

http://secunia.com/advisories/21838

http://secunia.com/advisories/21912

http://secunia.com/advisories/21926

http://secunia.com/advisories/22298

http://secunia.com/advisories/24950

http://secunia.com/advisories/25402

http://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc

http://security.gentoo.org/glsa/glsa-200609-11.xml

http://securitytracker.com/id?1016794

http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.481241

http://www.kb.cert.org/vuls/id/915404

http://www.mandriva.com/security/advisories?name=MDKSA-2006:163

http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en

http://www.novell.com/linux/security/advisories/2006_23_sr.html

http://www.novell.com/linux/security/advisories/2006_24_sr.html

http://www.openbsd.org/errata.html

http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html

http://www.securityfocus.com/archive/1/445600/100/0/threaded

http://www.securityfocus.com/bid/19859

http://www.ubuntu.com/usn/usn-343-1

http://www.us.debian.org/security/2006/dsa-1172

http://www.vupen.com/english/advisories/2006/3473

http://www.vupen.com/english/advisories/2007/1401

http://www.vupen.com/english/advisories/2007/1939

https://exchange.xforce.ibmcloud.com/vulnerabilities/28745

https://issues.rpath.com/browse/RPL-626

https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144

Details

Source: MITRE

Published: 2006-09-06

Updated: 2018-10-17

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Tenable Plugins

View all (12 total)

IDNameProductFamilySeverity
147379NewStart CGSL CORE 5.04 / MAIN 5.04 : bind Multiple Vulnerabilities (NS-SA-2021-0017)NessusNewStart CGSL Local Security Checks
critical
137170OracleVM 3.3 / 3.4 : bind (OVMSA-2020-0021)NessusOracleVM Local Security Checks
high
99569OracleVM 3.3 / 3.4 : bind (OVMSA-2017-0066)NessusOracleVM Local Security Checks
high
54866Slackware 10.0 / 10.1 / 10.2 / 9.0 / 9.1 / current : bind DoS (SSA:2006-257-01)NessusSlackware Local Security Checks
medium
29384SuSE 10 Security Update : bind (ZYPP Patch Number 2041)NessusSuSE Local Security Checks
medium
27922Ubuntu 5.04 / 5.10 / 6.06 LTS : bind9 vulnerabilities (USN-343-1)NessusUbuntu Local Security Checks
medium
25297Mac OS X Multiple Vulnerabilities (Security Update 2007-005)NessusMacOS X Local Security Checks
critical
23953FreeBSD : bind9 -- Denial of Service in named(8) (ef3306fc-8f9b-11db-ab33-000e0c2e438a)NessusFreeBSD Local Security Checks
medium
23907Mandrake Linux Security Advisory : bind (MDKSA-2006:163)NessusMandriva Local Security Checks
medium
22714Debian DSA-1172-1 : bind9 - programming errorNessusDebian Local Security Checks
medium
22356GLSA-200609-11 : BIND: Denial of ServiceNessusGentoo Local Security Checks
medium
22311ISC BIND 9 Multiple Remote DoSNessusDNS
medium