Bonjour < 1.0.5 Multiple Vulnerabilities (APPLE-SA-2009-09-09)

This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an application that is affected by
multiple vulnerabilities.

Description :

Bonjour for Windows is installed on the remote host. The installed
version is older than 1.0.5 and thus affected by multiple issues :

- A NULL pointer dereference issue could crash a remote
Bonjour service while resolving a maliciously crafted
'.local' domain name containing a long DNS label.

- Due to a weakness in DNS protocol implementation, it may
be possible to spoof DNS responses for unicast DNS
queries sent from an application that uses Bonjour APIs
to send unicast DNS queries. It should be noted that
there are currently no known applications that use
Bonjour
APIs for unicast DNS hostname resolution.

See also :

http://www.securityfocus.com/advisories/15334
http://www.nessus.org/u?dfd5604f

Solution :

Upgrade to Bonjour for Windows version 1.0.5.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 34242 (bonjour_1_0_5.nasl)

Bugtraq ID: 31093
31091

CVE ID: CVE-2008-2326
CVE-2008-3630

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now