CVE-2006-2073
Published Apr 27, 2006
Last updated 7 years ago
Overview
- Description
- Unspecified vulnerability in ISC BIND allows remote attackers to cause a denial of service via a crafted DNS message with a "broken" TSIG, as demonstrated by the OUSPG PROTOS DNS test suite.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Vendor comments
- Red HatThis issue did not affect the version of bind as shipped with Red Hat Enterprise Linux 5. We do not believe this issue has a security consequence for earlier versions of Red Hat Enterprise Linux. For details please see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=192192
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C52373DC-3E05-424B-9C78-4092A75C75A0" }, { "criteria": "cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "098633E6-88F0-4DBC-986F-D11EDA29877F" }, { "criteria": "cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1861756C-CC81-4EAB-8427-57A3C62BFF96" }, { "criteria": "cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CDD642FC-1764-4090-A32D-830CEAE69E53" }, { "criteria": "cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE954FD0-56AF-4757-BAA8-B0C64703F6AF" }, { "criteria": "cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF891263-4ACE-47C3-83F3-C06E49F32451" }, { "criteria": "cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA6520F4-B203-400A-8629-8A40B739DB11" }, { "criteria": "cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2AF07E87-B109-4B15-A358-7A454502E077" }, { "criteria": "cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "614C9459-D526-4880-AE03-4A1558CB941F" }, { "criteria": "cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CFA05CD-0BE4-4E85-A3DE-8B3E2622159F" }, { "criteria": "cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FA93166-513D-40AA-9855-FC89060BA03C" }, { "criteria": "cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B0D8854-64B6-42C9-B4D2-B2AF16AC0F03" }, { "criteria": "cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92F95086-3107-4C38-BB3B-7BABA9BD15C3" } ], "operator": "OR" } ] } ]