fkie_cve-2007-0494
Vulnerability from fkie_nvd
Published
2007-01-25 20:28
Modified
2024-11-21 00:26
Severity ?
Summary
ISC BIND 9.0.x, 9.1.x, 9.2.0 up to 9.2.7, 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (exit) via a type * (ANY) DNS query response that contains multiple RRsets, which triggers an assertion error, aka the "DNSSEC Validation" vulnerability.
References
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
secalert@redhat.comhttp://docs.info.apple.com/article.html?artnum=305530
secalert@redhat.comhttp://fedoranews.org/cms/node/2507
secalert@redhat.comhttp://fedoranews.org/cms/node/2537
secalert@redhat.comhttp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2007/May/msg00004.html
secalert@redhat.comhttp://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
secalert@redhat.comhttp://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.html
secalert@redhat.comhttp://marc.info/?l=bind-announce&m=116968519300764&w=2
secalert@redhat.comhttp://secunia.com/advisories/23904Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/23924Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/23943Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/23944Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/23972Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/23974Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/23977Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24014Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24048Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24054Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24083Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24129Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24203Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24284
secalert@redhat.comhttp://secunia.com/advisories/24648Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24930Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24950Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/25402Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/25482
secalert@redhat.comhttp://secunia.com/advisories/25649
secalert@redhat.comhttp://secunia.com/advisories/25715
secalert@redhat.comhttp://secunia.com/advisories/26909
secalert@redhat.comhttp://secunia.com/advisories/27706
secalert@redhat.comhttp://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200702-06.xml
secalert@redhat.comhttp://securitytracker.com/id?1017573
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.494157
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102969-1
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2007-125.htm
secalert@redhat.comhttp://www-1.ibm.com/support/docview.wss?uid=isg1IY95618
secalert@redhat.comhttp://www-1.ibm.com/support/docview.wss?uid=isg1IY95619
secalert@redhat.comhttp://www-1.ibm.com/support/docview.wss?uid=isg1IY96144
secalert@redhat.comhttp://www-1.ibm.com/support/docview.wss?uid=isg1IY96324
secalert@redhat.comhttp://www.debian.org/security/2007/dsa-1254
secalert@redhat.comhttp://www.isc.org/index.pl?/sw/bind/bind-security.php
secalert@redhat.comhttp://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8Patch
secalert@redhat.comhttp://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4Patch
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:030
secalert@redhat.comhttp://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0044.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0057.html
secalert@redhat.comhttp://www.securityfocus.com/bid/22231
secalert@redhat.comhttp://www.trustix.org/errata/2007/0005
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-418-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/1401
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/1939
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2002
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2163
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2245
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2315
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/3229
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/31838
secalert@redhat.comhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-989
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11523
secalert@redhat.comhttps://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
secalert@redhat.comhttps://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
secalert@redhat.comhttps://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
secalert@redhat.comhttps://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=305530
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/cms/node/2507
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/cms/node/2537
af854a3a-2127-422b-91ae-364da2661108http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
af854a3a-2127-422b-91ae-364da2661108http://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bind-announce&m=116968519300764&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23904Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23924Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23943Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23944Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23972Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23974Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23977Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24014Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24048Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24054Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24083Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24129Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24203Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24284
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24648Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24930Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24950Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25402Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25482
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25649
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25715
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26909
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27706
af854a3a-2127-422b-91ae-364da2661108http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200702-06.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017573
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.494157
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-102969-1
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2007-125.htm
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=isg1IY95618
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=isg1IY95619
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=isg1IY96144
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=isg1IY96324
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1254
af854a3a-2127-422b-91ae-364da2661108http://www.isc.org/index.pl?/sw/bind/bind-security.php
af854a3a-2127-422b-91ae-364da2661108http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8Patch
af854a3a-2127-422b-91ae-364da2661108http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4Patch
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:030
af854a3a-2127-422b-91ae-364da2661108http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0044.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0057.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/22231
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0005
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-418-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1401
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1939
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2002
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2163
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2245
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2315
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3229
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/31838
af854a3a-2127-422b-91ae-364da2661108https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-989
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11523
af854a3a-2127-422b-91ae-364da2661108https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
af854a3a-2127-422b-91ae-364da2661108https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
af854a3a-2127-422b-91ae-364da2661108https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
af854a3a-2127-422b-91ae-364da2661108https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Impacted products
Vendor Product Version
isc bind 9.0
isc bind 9.0.0
isc bind 9.0.0
isc bind 9.0.0
isc bind 9.0.0
isc bind 9.0.0
isc bind 9.0.0
isc bind 9.0.1
isc bind 9.0.1
isc bind 9.0.1
isc bind 9.1
isc bind 9.1.0
isc bind 9.1.1
isc bind 9.1.1
isc bind 9.1.1
isc bind 9.1.1
isc bind 9.1.1
isc bind 9.1.1
isc bind 9.1.1
isc bind 9.1.1
isc bind 9.1.2
isc bind 9.1.2
isc bind 9.1.3
isc bind 9.1.3
isc bind 9.1.3
isc bind 9.1.3
isc bind 9.2
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.0
isc bind 9.2.1
isc bind 9.2.1
isc bind 9.2.1
isc bind 9.2.2
isc bind 9.2.2
isc bind 9.2.2
isc bind 9.2.2
isc bind 9.2.3
isc bind 9.2.3
isc bind 9.2.3
isc bind 9.2.3
isc bind 9.2.3
isc bind 9.2.4
isc bind 9.2.4
isc bind 9.2.4
isc bind 9.2.4
isc bind 9.2.4
isc bind 9.2.4
isc bind 9.2.4
isc bind 9.2.4
isc bind 9.2.5
isc bind 9.2.5
isc bind 9.2.5
isc bind 9.2.6
isc bind 9.2.6
isc bind 9.3
isc bind 9.3.0
isc bind 9.3.0
isc bind 9.3.0
isc bind 9.3.0
isc bind 9.3.0
isc bind 9.3.0
isc bind 9.3.0
isc bind 9.3.0
isc bind 9.3.1
isc bind 9.3.1
isc bind 9.3.1
isc bind 9.3.2
isc bind 9.3.2
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.5.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C52373DC-3E05-424B-9C78-4092A75C75A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AFE06E29-0A16-4034-A2BB-696A49798F00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "75CECA87-F721-429B-8062-D3297233C14D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "2F1447B1-A25F-45CC-B721-3204D7107999",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "C61FB240-C932-4A3A-874D-5872F01EB352",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "999AF289-8D73-4648-ABCB-4853B9B1F230",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "6743968D-DDB2-4478-867A-642CCC492B96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "098633E6-88F0-4DBC-986F-D11EDA29877F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "78725CCE-C153-4B00-8E76-ED6DFC1C86A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1950F046-FBD4-4A92-BA70-5E80374A12AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1861756C-CC81-4EAB-8427-57A3C62BFF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5E53EFD9-16B8-457D-8C27-7771018EA524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD642FC-1764-4090-A32D-830CEAE69E53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "79503328-9EE2-414E-A6E8-B3BABA0D6CAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2ABA5AA3-8951-4158-A4C6-64BE2010D39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "77A2D767-8E2D-4D65-ACF3-634B055023CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "D28C3D4C-5C3B-4686-9F67-6379C2AC338A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.1:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "543DE620-09A2-4055-B30C-803C714237B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.1:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "2C16513C-48A1-4FB6-AB11-F844ABC4BB66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.1:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "607BF60B-27F1-4C85-BB5F-D66FEA05CD4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE954FD0-56AF-4757-BAA8-B0C64703F6AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0EC243E5-D80C-43A8-AD12-5DA0FA442086",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF891263-4ACE-47C3-83F3-C06E49F32451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "01C3704B-8328-46C3-ACB1-D27FD7DED508",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF9000CE-EB3A-4194-84D1-4BB4C5010D29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "19A4E6C3-CF69-4A81-B179-EB8F656E72AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F947835-8E96-4793-B81E-EEC103BF0CB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6520F4-B203-400A-8629-8A40B739DB11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "55D7907A-46D1-4F7D-8B2F-321214204704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:a2:*:*:*:*:*:*",
              "matchCriteriaId": "B06686CF-0FFD-45D8-A9F6-D13DCF3E6EB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:a3:*:*:*:*:*:*",
              "matchCriteriaId": "EBF04613-7F33-4A63-A776-47C9A0BDBF1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "FA3C3939-2065-4A8C-99F8-BE44D1D2ABA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "DEE416F3-CDAE-4285-9EC7-F3E161EDCA0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "365BFA38-A0F6-4D48-A6B5-E534F88516DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc10:*:*:*:*:*:*",
              "matchCriteriaId": "CF2F3360-F5C2-47C1-B2E7-935CDB47407A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "52FBAE24-C9F7-4756-A7A0-A877ABFC3444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "A7230CE4-CD95-484C-A004-457FD4484403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "A0BB3172-BFBC-4F56-8116-6EEC30FD566F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D40FB919-A955-419D-9BEC-835F93E4FEF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FF8A8F48-A890-4837-8C76-1A690523B39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "399D70C9-8E61-4624-A7AD-9410AA7641B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "2BB2F03D-96C6-49CD-80FA-570FF72B493F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.0:rc9:*:*:*:*:*:*",
              "matchCriteriaId": "60DC3DF4-4B36-4AA8-8561-C4255A8C4E18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF07E87-B109-4B15-A358-7A454502E077",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "2E5D0852-413F-4875-93F5-64DDBCA6E85E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "301BF336-6AF6-4705-9BF1-00ED6608F572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "614C9459-D526-4880-AE03-4A1558CB941F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.2:p2:*:*:*:*:*:*",
              "matchCriteriaId": "A8B15E71-656A-4EB7-96B2-2CC9A2C19DC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*",
              "matchCriteriaId": "A969C3E7-9E4F-4767-86D1-7E6B3970A7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "34B56EBF-6218-46B7-A9F2-288E40635FAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CFA05CD-0BE4-4E85-A3DE-8B3E2622159F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A10ACCBC-6697-4BCB-9748-B966D83E0C03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "719382EA-7D4E-46F2-92ED-DCA83AE685BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "9EDF0B51-76D3-4BD8-A2C7-6F21153CB886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.3:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "2D800F08-9B7A-4284-B2EF-DCDF60DEEC04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D43375C5-0736-43DE-99B5-B75719D0AD0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4E492452-CBDB-43BC-A9AD-21AA84EA0653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "D5BD68D9-6CD9-48A7-A242-38B9ADD420BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "65C15AB2-DCA7-4983-A741-3CA1D4A391A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "6C6DB780-C075-462C-B426-1917A020C4BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "3B4FD922-49B2-4953-8EF2-9018B104BC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "367DC15C-7174-4463-8D4B-B3E43AC0A57E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.4:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "CAEC7B62-DBBF-4ADD-81F7-8AD1F3642E92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4360536-0BA6-41DB-AA87-45AFB51562CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.5:b2:*:*:*:*:*:*",
              "matchCriteriaId": "E3CBD1CC-14DF-4F00-9A5E-6D7A6604A8A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "93C5ED24-5A13-4F06-BC9F-B8B8F46C1888",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "438AEC8C-DD71-4A25-9E9D-A89415F7EC83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36A47938-C5AC-4471-A791-6F21AE20B85C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FA93166-513D-40AA-9855-FC89060BA03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "847C1017-F964-4A33-BEA8-DDB202DD0FB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "87B48470-26BF-4AE5-BEF3-7A2C82D59513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "D795C310-AC2A-4680-B516-508F7AF584AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "EAA7F932-4DA1-4B03-8761-AB2353B4935E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F5DC0048-3DC4-40A7-99A2-7686B3DA4FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "F43C77D0-2052-417D-9EA8-1A89A06BF010",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F574AA97-6037-4957-9BDD-6C720B3A292B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "6B67499F-7A9D-467B-834B-F4D61DBBE313",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B0D8854-64B6-42C9-B4D2-B2AF16AC0F03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.1:b2:*:*:*:*:*:*",
              "matchCriteriaId": "6CB6CACC-3E1E-4115-AC9B-C9F99522D4C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "062A3D39-9B49-49D3-8FB4-FB4FC4A71D34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "92F95086-3107-4C38-BB3B-7BABA9BD15C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "8669EA1C-DAA7-44FC-B675-01641BB8787E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "C4B45FE3-307E-4599-B2CF-5203FA606469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a2:*:*:*:*:*:*",
              "matchCriteriaId": "F12E3841-1CF0-4969-A286-50769BAE31EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a3:*:*:*:*:*:*",
              "matchCriteriaId": "D8B11586-1274-422D-873A-25DF193FB0C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a4:*:*:*:*:*:*",
              "matchCriteriaId": "87D61CDA-BB78-4957-A502-6D77B567B3F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a5:*:*:*:*:*:*",
              "matchCriteriaId": "5A31533C-BD6E-4EB4-8047-3257BF51F592",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "6D7D1A96-0A8E-4E3A-9442-701E3D1A1F5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "93C23313-817F-4AB5-9058-31B0C7F954A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "FA9F93EC-1AA2-43A6-9869-8974C819370A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "8F0AA9D0-9657-4E18-BF8B-45284C2D40A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "76B4ED8A-9182-4403-8F66-3EB360E73477",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ISC BIND 9.0.x, 9.1.x, 9.2.0 up to 9.2.7, 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (exit) via a type * (ANY) DNS query response that contains multiple RRsets, which triggers an assertion error, aka the \"DNSSEC Validation\" vulnerability."
    },
    {
      "lang": "es",
      "value": "ISC BIND 9.0.x, 9.1.x, 9.2.0 hasta la versi\u00f3n 9.2.7, 9.3.0 hasta la versi\u00f3n 9.3.3, 9.4.0a1 hasta la versi\u00f3n 9.4.0a6, 9.4.0b1 hasta la versi\u00f3n 9.4.0b4, 9.4.0rc1 y 9.5.0a1 (solo Bind Forum) permite a atacantes remotos provocar una denegaci\u00f3n de servicio (salida) a trav\u00e9s de la respuesta a una consulta DNS tipo * (ANY) que contiene m\u00faltiples RRsets, lo que desencadena un error de aserci\u00f3n, tambi\u00e9n conocido como la vulnerabilidad \"DNSSEC Validation\"."
    }
  ],
  "evaluatorSolution": "Syccessful exploitation requires that the victim has enabled dnssec validation in named.conf by specifying trusted-keys.",
  "id": "CVE-2007-0494",
  "lastModified": "2024-11-21T00:26:00.483",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-01-25T20:28:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://docs.info.apple.com/article.html?artnum=305530"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://fedoranews.org/cms/node/2507"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://fedoranews.org/cms/node/2537"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01070495"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01070495"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bind-announce\u0026m=116968519300764\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23904"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23924"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23943"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23944"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23972"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23974"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23977"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24014"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24048"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24054"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24083"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24129"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24203"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24284"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24648"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24930"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24950"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25402"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/25482"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/25649"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/25715"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26909"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/27706"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-200702-06.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1017573"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.494157"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102969-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-125.htm"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY95618"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY95619"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY96144"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY96324"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2007/dsa-1254"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:030"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0044.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0057.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/22231"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.trustix.org/errata/2007/0005"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-418-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/1401"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/1939"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/2002"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/2163"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/2245"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/2315"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/3229"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31838"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-989"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11523"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=305530"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://fedoranews.org/cms/node/2507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://fedoranews.org/cms/node/2537"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01070495"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01070495"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bind-announce\u0026m=116968519300764\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23904"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23924"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23943"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23944"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23972"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23974"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23977"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24014"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24048"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24054"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24129"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24203"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24648"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24930"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24950"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25402"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25482"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25649"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25715"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26909"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27706"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200702-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017573"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.494157"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102969-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-125.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY95618"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY95619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY96144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY96324"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1254"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:030"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0044.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0057.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/22231"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2007/0005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-418-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1401"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2163"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2245"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2315"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3229"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31838"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-989"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11523"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-19"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.