cvelist/2007/0xxx/CVE-2007-0493.json
2018-10-16 11:17:01 -04:00

313 lines
10 KiB
JSON

{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2007-0493",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Use-after-free vulnerability in ISC BIND 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (named daemon crash) via unspecified vectors that cause named to \"dereference a freed fetch context.\""
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20070125 BIND remote exploit (low severity) [Fwd: Internet Systems Consortium Security Advisory.]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/458066/100/0/threaded"
},
{
"name" : "20070125 BIND remote exploit (low severity) [Fwd: Internet Systems Consortium Security Advisory.]",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/052018.html"
},
{
"name" : "[bind-announce] 20070125 Internet Systems Consortium Security Advisory.",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=bind-announce&m=116968519321296&w=2"
},
{
"name" : "http://www.isc.org/index.pl?/sw/bind/bind-security.php",
"refsource" : "CONFIRM",
"url" : "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
},
{
"name" : "http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8",
"refsource" : "CONFIRM",
"url" : "http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8"
},
{
"name" : "http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4",
"refsource" : "CONFIRM",
"url" : "http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4"
},
{
"name" : "https://issues.rpath.com/browse/RPL-989",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-989"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=305530",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"name" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488",
"refsource" : "CONFIRM",
"url" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488"
},
{
"name" : "APPLE-SA-2007-05-24",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"name" : "FEDORA-2007-147",
"refsource" : "FEDORA",
"url" : "http://fedoranews.org/cms/node/2507"
},
{
"name" : "FEDORA-2007-164",
"refsource" : "FEDORA",
"url" : "http://fedoranews.org/cms/node/2537"
},
{
"name" : "FreeBSD-SA-07:02",
"refsource" : "FREEBSD",
"url" : "http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc"
},
{
"name" : "GLSA-200702-06",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200702-06.xml"
},
{
"name" : "HPSBTU02207",
"refsource" : "HP",
"url" : "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
},
{
"name" : "SSRT061213",
"refsource" : "HP",
"url" : "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
},
{
"name" : "SSRT061239",
"refsource" : "HP",
"url" : "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
},
{
"name" : "SSRT071304",
"refsource" : "HP",
"url" : "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
},
{
"name" : "HPSBUX02219",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495"
},
{
"name" : "SSRT061273",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495"
},
{
"name" : "MDKSA-2007:030",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:030"
},
{
"name" : "NetBSD-SA2007-003",
"refsource" : "NETBSD",
"url" : "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc"
},
{
"name" : "OpenPKG-SA-2007.007",
"refsource" : "OPENPKG",
"url" : "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.html"
},
{
"name" : "RHSA-2007:0057",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0057.html"
},
{
"name" : "SSA:2007-026-01",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.494157"
},
{
"name" : "SUSE-SA:2007:014",
"refsource" : "SUSE",
"url" : "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.html"
},
{
"name" : "2007-0005",
"refsource" : "TRUSTIX",
"url" : "http://www.trustix.org/errata/2007/0005"
},
{
"name" : "USN-418-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-418-1"
},
{
"name" : "22229",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/22229"
},
{
"name" : "oval:org.mitre.oval:def:9614",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9614"
},
{
"name" : "ADV-2007-0349",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/0349"
},
{
"name" : "ADV-2007-1401",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1401"
},
{
"name" : "ADV-2007-1939",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1939"
},
{
"name" : "ADV-2007-2163",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2163"
},
{
"name" : "ADV-2007-2315",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2315"
},
{
"name" : "1017561",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1017561"
},
{
"name" : "23904",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23904"
},
{
"name" : "23972",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23972"
},
{
"name" : "23924",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23924"
},
{
"name" : "23943",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23943"
},
{
"name" : "23974",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23974"
},
{
"name" : "23977",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23977"
},
{
"name" : "24054",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24054"
},
{
"name" : "24014",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24014"
},
{
"name" : "24048",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24048"
},
{
"name" : "24129",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24129"
},
{
"name" : "24203",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24203"
},
{
"name" : "24950",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24950"
},
{
"name" : "24930",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/24930"
},
{
"name" : "25402",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25402"
},
{
"name" : "25649",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/25649"
}
]
}
}