Bonjour < 1.0.5 Multiple Vulnerabilities (APPLE-SA-2009-09-09)

medium Nessus Plugin ID 34242


The remote Windows host has an application that is affected by multiple vulnerabilities.


Bonjour for Windows is installed on the remote host. The installed version is older than 1.0.5 and thus affected by multiple issues :

- A NULL pointer dereference issue could crash a remote Bonjour service while resolving a maliciously crafted '.local' domain name containing a long DNS label.

- Due to a weakness in DNS protocol implementation, it may be possible to spoof DNS responses for unicast DNS queries sent from an application that uses Bonjour APIs to send unicast DNS queries. It should be noted that there are currently no known applications that use Bonjour APIs for unicast DNS hostname resolution.


Upgrade to Bonjour for Windows version 1.0.5.

See Also

Plugin Details

Severity: Medium

ID: 34242

File Name: bonjour_1_0_5.nasl

Version: 1.13

Type: local

Agent: windows

Family: Windows

Published: 9/18/2008

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Medium

Score: 4.4


Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2008-2326, CVE-2008-3630

BID: 31093, 31091

CWE: 20