{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2007-0493", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Use-after-free vulnerability in ISC BIND 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (named daemon crash) via unspecified vectors that cause named to \"dereference a freed fetch context.\"" } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20070125 BIND remote exploit (low severity) [Fwd: Internet Systems Consortium Security Advisory.]", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/458066/100/0/threaded" }, { "name" : "20070125 BIND remote exploit (low severity) [Fwd: Internet Systems Consortium Security Advisory.]", "refsource" : "FULLDISC", "url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/052018.html" }, { "name" : "[bind-announce] 20070125 Internet Systems Consortium Security Advisory.", "refsource" : "MLIST", "url" : "http://marc.info/?l=bind-announce&m=116968519321296&w=2" }, { "name" : "http://www.isc.org/index.pl?/sw/bind/bind-security.php", "refsource" : "CONFIRM", "url" : "http://www.isc.org/index.pl?/sw/bind/bind-security.php" }, { "name" : "http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8", "refsource" : "CONFIRM", "url" : "http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8" }, { "name" : "http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4", "refsource" : "CONFIRM", "url" : "http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4" }, { "name" : "https://issues.rpath.com/browse/RPL-989", "refsource" : "CONFIRM", "url" : "https://issues.rpath.com/browse/RPL-989" }, { "name" : "http://docs.info.apple.com/article.html?artnum=305530", "refsource" : "CONFIRM", "url" : "http://docs.info.apple.com/article.html?artnum=305530" }, { "name" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488", "refsource" : "CONFIRM", "url" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488" }, { "name" : "APPLE-SA-2007-05-24", "refsource" : "APPLE", "url" : "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html" }, { "name" : "FEDORA-2007-147", "refsource" : "FEDORA", "url" : "http://fedoranews.org/cms/node/2507" }, { "name" : "FEDORA-2007-164", "refsource" : "FEDORA", "url" : "http://fedoranews.org/cms/node/2537" }, { "name" : "FreeBSD-SA-07:02", "refsource" : "FREEBSD", "url" : "http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc" }, { "name" : "GLSA-200702-06", "refsource" : "GENTOO", "url" : "http://security.gentoo.org/glsa/glsa-200702-06.xml" }, { "name" : "HPSBTU02207", "refsource" : "HP", "url" : "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144" }, { "name" : "SSRT061213", "refsource" : "HP", "url" : "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144" }, { "name" : "SSRT061239", "refsource" : "HP", "url" : "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144" }, { "name" : "SSRT071304", "refsource" : "HP", "url" : "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144" }, { "name" : "HPSBUX02219", "refsource" : "HP", "url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495" }, { "name" : "SSRT061273", "refsource" : "HP", "url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495" }, { "name" : "MDKSA-2007:030", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:030" }, { "name" : "NetBSD-SA2007-003", "refsource" : "NETBSD", "url" : "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc" }, { "name" : "OpenPKG-SA-2007.007", "refsource" : "OPENPKG", "url" : "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.html" }, { "name" : "RHSA-2007:0057", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2007-0057.html" }, { "name" : "SSA:2007-026-01", "refsource" : "SLACKWARE", "url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.494157" }, { "name" : "SUSE-SA:2007:014", "refsource" : "SUSE", "url" : "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.html" }, { "name" : "2007-0005", "refsource" : "TRUSTIX", "url" : "http://www.trustix.org/errata/2007/0005" }, { "name" : "USN-418-1", "refsource" : "UBUNTU", "url" : "http://www.ubuntu.com/usn/usn-418-1" }, { "name" : "22229", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/22229" }, { "name" : "oval:org.mitre.oval:def:9614", "refsource" : "OVAL", "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9614" }, { "name" : "ADV-2007-0349", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/0349" }, { "name" : "ADV-2007-1401", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/1401" }, { "name" : "ADV-2007-1939", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/1939" }, { "name" : "ADV-2007-2163", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/2163" }, { "name" : "ADV-2007-2315", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/2315" }, { "name" : "1017561", "refsource" : "SECTRACK", "url" : "http://securitytracker.com/id?1017561" }, { "name" : "23904", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/23904" }, { "name" : "23972", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/23972" }, { "name" : "23924", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/23924" }, { "name" : "23943", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/23943" }, { "name" : "23974", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/23974" }, { "name" : "23977", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/23977" }, { "name" : "24054", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24054" }, { "name" : "24014", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24014" }, { "name" : "24048", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24048" }, { "name" : "24129", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24129" }, { "name" : "24203", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24203" }, { "name" : "24950", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24950" }, { "name" : "24930", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24930" }, { "name" : "25402", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/25402" }, { "name" : "25649", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/25649" } ] } }