CVE-2006-4095

BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via certain SIG queries, which cause an assertion failure when multiple RRsets are returned.
References
Link Resource
http://docs.info.apple.com/article.html?artnum=305530 Broken Link
http://lists.apple.com/archives/security-announce/2007/May/msg00004.html Mailing List
http://secunia.com/advisories/21752 Broken Link
http://secunia.com/advisories/21786 Broken Link
http://secunia.com/advisories/21816 Broken Link
http://secunia.com/advisories/21818 Broken Link
http://secunia.com/advisories/21828 Broken Link
http://secunia.com/advisories/21835 Broken Link
http://secunia.com/advisories/21838 Broken Link
http://secunia.com/advisories/21912 Broken Link
http://secunia.com/advisories/21926 Broken Link
http://secunia.com/advisories/22298 Broken Link
http://secunia.com/advisories/24950 Broken Link
http://secunia.com/advisories/25402 Broken Link
http://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc Third Party Advisory
http://security.gentoo.org/glsa/glsa-200609-11.xml Third Party Advisory
http://securitytracker.com/id?1016794 Broken Link Third Party Advisory VDB Entry
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.481241 Broken Link
http://www.kb.cert.org/vuls/id/915404 Patch Third Party Advisory US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:163 Broken Link
http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en Broken Link Patch
http://www.novell.com/linux/security/advisories/2006_23_sr.html Broken Link
http://www.novell.com/linux/security/advisories/2006_24_sr.html Broken Link
http://www.openbsd.org/errata.html Release Notes
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html Broken Link
http://www.securityfocus.com/archive/1/445600/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/19859 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-343-1 Third Party Advisory
http://www.us.debian.org/security/2006/dsa-1172 Broken Link
http://www.vupen.com/english/advisories/2006/3473 Broken Link
http://www.vupen.com/english/advisories/2007/1401 Broken Link
http://www.vupen.com/english/advisories/2007/1939 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/28745 Third Party Advisory VDB Entry
https://issues.rpath.com/browse/RPL-626 Broken Link
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*

History

15 Feb 2024, 21:04

Type Values Removed Values Added
CWE NVD-CWE-Other CWE-617
First Time Apple mac Os X Server
Canonical
Apple mac Os X
Apple
Canonical ubuntu Linux
CVSS v2 : 5.0
v3 : unknown
v2 : 5.0
v3 : 7.5
References () http://docs.info.apple.com/article.html?artnum=305530 - () http://docs.info.apple.com/article.html?artnum=305530 - Broken Link
References () http://lists.apple.com/archives/security-announce/2007/May/msg00004.html - () http://lists.apple.com/archives/security-announce/2007/May/msg00004.html - Mailing List
References () http://secunia.com/advisories/21752 - () http://secunia.com/advisories/21752 - Broken Link
References () http://secunia.com/advisories/21786 - () http://secunia.com/advisories/21786 - Broken Link
References () http://secunia.com/advisories/21816 - () http://secunia.com/advisories/21816 - Broken Link
References () http://secunia.com/advisories/21818 - () http://secunia.com/advisories/21818 - Broken Link
References () http://secunia.com/advisories/21828 - () http://secunia.com/advisories/21828 - Broken Link
References () http://secunia.com/advisories/21835 - () http://secunia.com/advisories/21835 - Broken Link
References () http://secunia.com/advisories/21838 - () http://secunia.com/advisories/21838 - Broken Link
References () http://secunia.com/advisories/21912 - () http://secunia.com/advisories/21912 - Broken Link
References () http://secunia.com/advisories/21926 - () http://secunia.com/advisories/21926 - Broken Link
References () http://secunia.com/advisories/22298 - () http://secunia.com/advisories/22298 - Broken Link
References () http://secunia.com/advisories/24950 - () http://secunia.com/advisories/24950 - Broken Link
References () http://secunia.com/advisories/25402 - () http://secunia.com/advisories/25402 - Broken Link
References () http://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc - () http://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc - Third Party Advisory
References () http://security.gentoo.org/glsa/glsa-200609-11.xml - () http://security.gentoo.org/glsa/glsa-200609-11.xml - Third Party Advisory
References () http://securitytracker.com/id?1016794 - () http://securitytracker.com/id?1016794 - Broken Link, Third Party Advisory, VDB Entry
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.481241 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.481241 - Broken Link
References () http://www.kb.cert.org/vuls/id/915404 - Patch, US Government Resource () http://www.kb.cert.org/vuls/id/915404 - Patch, Third Party Advisory, US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:163 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:163 - Broken Link
References () http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en - Patch () http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en - Broken Link, Patch
References () http://www.novell.com/linux/security/advisories/2006_23_sr.html - () http://www.novell.com/linux/security/advisories/2006_23_sr.html - Broken Link
References () http://www.novell.com/linux/security/advisories/2006_24_sr.html - () http://www.novell.com/linux/security/advisories/2006_24_sr.html - Broken Link
References () http://www.openbsd.org/errata.html - () http://www.openbsd.org/errata.html - Release Notes
References () http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html - () http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html - Broken Link
References () http://www.securityfocus.com/archive/1/445600/100/0/threaded - () http://www.securityfocus.com/archive/1/445600/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/19859 - () http://www.securityfocus.com/bid/19859 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/usn-343-1 - () http://www.ubuntu.com/usn/usn-343-1 - Third Party Advisory
References () http://www.us.debian.org/security/2006/dsa-1172 - () http://www.us.debian.org/security/2006/dsa-1172 - Broken Link
References () http://www.vupen.com/english/advisories/2006/3473 - () http://www.vupen.com/english/advisories/2006/3473 - Broken Link
References () http://www.vupen.com/english/advisories/2007/1401 - () http://www.vupen.com/english/advisories/2007/1401 - Broken Link
References () http://www.vupen.com/english/advisories/2007/1939 - () http://www.vupen.com/english/advisories/2007/1939 - Broken Link
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28745 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28745 - Third Party Advisory, VDB Entry
References () https://issues.rpath.com/browse/RPL-626 - () https://issues.rpath.com/browse/RPL-626 - Broken Link
References () https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144 - () https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144 - Broken Link
CPE cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*

Information

Published : 2006-09-06 00:04

Updated : 2024-02-15 21:04


NVD link : CVE-2006-4095

Mitre link : CVE-2006-4095

CVE.ORG link : CVE-2006-4095


JSON object : View

Products Affected

isc

  • bind

canonical

  • ubuntu_linux

apple

  • mac_os_x_server
  • mac_os_x
CWE
CWE-617

Reachable Assertion