mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
408 lines
14 KiB
JSON
408 lines
14 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2007-0494",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "ISC BIND 9.0.x, 9.1.x, 9.2.0 up to 9.2.7, 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (exit) via a type * (ANY) DNS query response that contains multiple RRsets, which triggers an assertion error, aka the \"DNSSEC Validation\" vulnerability."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player",
|
|
"refsource" : "FULLDISC",
|
|
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"
|
|
},
|
|
{
|
|
"name" : "[bind-announce] 20070125 Internet Systems Consortium Security Advisory.",
|
|
"refsource" : "MLIST",
|
|
"url" : "http://marc.info/?l=bind-announce&m=116968519300764&w=2"
|
|
},
|
|
{
|
|
"name" : "http://www.isc.org/index.pl?/sw/bind/bind-security.php",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
|
|
},
|
|
{
|
|
"name" : "http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8"
|
|
},
|
|
{
|
|
"name" : "http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4"
|
|
},
|
|
{
|
|
"name" : "https://issues.rpath.com/browse/RPL-989",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://issues.rpath.com/browse/RPL-989"
|
|
},
|
|
{
|
|
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-125.htm",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-125.htm"
|
|
},
|
|
{
|
|
"name" : "http://docs.info.apple.com/article.html?artnum=305530",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://docs.info.apple.com/article.html?artnum=305530"
|
|
},
|
|
{
|
|
"name" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488"
|
|
},
|
|
{
|
|
"name" : "IY95618",
|
|
"refsource" : "AIXAPAR",
|
|
"url" : "http://www-1.ibm.com/support/docview.wss?uid=isg1IY95618"
|
|
},
|
|
{
|
|
"name" : "IY95619",
|
|
"refsource" : "AIXAPAR",
|
|
"url" : "http://www-1.ibm.com/support/docview.wss?uid=isg1IY95619"
|
|
},
|
|
{
|
|
"name" : "IY96144",
|
|
"refsource" : "AIXAPAR",
|
|
"url" : "http://www-1.ibm.com/support/docview.wss?uid=isg1IY96144"
|
|
},
|
|
{
|
|
"name" : "IY96324",
|
|
"refsource" : "AIXAPAR",
|
|
"url" : "http://www-1.ibm.com/support/docview.wss?uid=isg1IY96324"
|
|
},
|
|
{
|
|
"name" : "APPLE-SA-2007-05-24",
|
|
"refsource" : "APPLE",
|
|
"url" : "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
|
|
},
|
|
{
|
|
"name" : "DSA-1254",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2007/dsa-1254"
|
|
},
|
|
{
|
|
"name" : "FEDORA-2007-147",
|
|
"refsource" : "FEDORA",
|
|
"url" : "http://fedoranews.org/cms/node/2507"
|
|
},
|
|
{
|
|
"name" : "FEDORA-2007-164",
|
|
"refsource" : "FEDORA",
|
|
"url" : "http://fedoranews.org/cms/node/2537"
|
|
},
|
|
{
|
|
"name" : "FreeBSD-SA-07:02",
|
|
"refsource" : "FREEBSD",
|
|
"url" : "http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc"
|
|
},
|
|
{
|
|
"name" : "GLSA-200702-06",
|
|
"refsource" : "GENTOO",
|
|
"url" : "http://security.gentoo.org/glsa/glsa-200702-06.xml"
|
|
},
|
|
{
|
|
"name" : "HPSBTU02207",
|
|
"refsource" : "HP",
|
|
"url" : "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
|
|
},
|
|
{
|
|
"name" : "SSRT061213",
|
|
"refsource" : "HP",
|
|
"url" : "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
|
|
},
|
|
{
|
|
"name" : "SSRT061239",
|
|
"refsource" : "HP",
|
|
"url" : "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
|
|
},
|
|
{
|
|
"name" : "SSRT071304",
|
|
"refsource" : "HP",
|
|
"url" : "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"
|
|
},
|
|
{
|
|
"name" : "HPSBUX02219",
|
|
"refsource" : "HP",
|
|
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495"
|
|
},
|
|
{
|
|
"name" : "SSRT061273",
|
|
"refsource" : "HP",
|
|
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495"
|
|
},
|
|
{
|
|
"name" : "MDKSA-2007:030",
|
|
"refsource" : "MANDRIVA",
|
|
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:030"
|
|
},
|
|
{
|
|
"name" : "NetBSD-SA2007-003",
|
|
"refsource" : "NETBSD",
|
|
"url" : "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc"
|
|
},
|
|
{
|
|
"name" : "OpenPKG-SA-2007.007",
|
|
"refsource" : "OPENPKG",
|
|
"url" : "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2007:0044",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0044.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2007:0057",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0057.html"
|
|
},
|
|
{
|
|
"name" : "20070201-01-P",
|
|
"refsource" : "SGI",
|
|
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
|
|
},
|
|
{
|
|
"name" : "SSA:2007-026-01",
|
|
"refsource" : "SLACKWARE",
|
|
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.494157"
|
|
},
|
|
{
|
|
"name" : "102969",
|
|
"refsource" : "SUNALERT",
|
|
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102969-1"
|
|
},
|
|
{
|
|
"name" : "SUSE-SA:2007:014",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.html"
|
|
},
|
|
{
|
|
"name" : "2007-0005",
|
|
"refsource" : "TRUSTIX",
|
|
"url" : "http://www.trustix.org/errata/2007/0005"
|
|
},
|
|
{
|
|
"name" : "USN-418-1",
|
|
"refsource" : "UBUNTU",
|
|
"url" : "http://www.ubuntu.com/usn/usn-418-1"
|
|
},
|
|
{
|
|
"name" : "22231",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/22231"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:11523",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11523"
|
|
},
|
|
{
|
|
"name" : "ADV-2007-1401",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2007/1401"
|
|
},
|
|
{
|
|
"name" : "ADV-2007-1939",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2007/1939"
|
|
},
|
|
{
|
|
"name" : "ADV-2007-2002",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2007/2002"
|
|
},
|
|
{
|
|
"name" : "ADV-2007-2163",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2007/2163"
|
|
},
|
|
{
|
|
"name" : "ADV-2007-2245",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2007/2245"
|
|
},
|
|
{
|
|
"name" : "ADV-2007-2315",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2007/2315"
|
|
},
|
|
{
|
|
"name" : "ADV-2007-3229",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2007/3229"
|
|
},
|
|
{
|
|
"name" : "1017573",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1017573"
|
|
},
|
|
{
|
|
"name" : "23904",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/23904"
|
|
},
|
|
{
|
|
"name" : "23972",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/23972"
|
|
},
|
|
{
|
|
"name" : "23924",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/23924"
|
|
},
|
|
{
|
|
"name" : "23944",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/23944"
|
|
},
|
|
{
|
|
"name" : "23943",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/23943"
|
|
},
|
|
{
|
|
"name" : "23974",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/23974"
|
|
},
|
|
{
|
|
"name" : "23977",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/23977"
|
|
},
|
|
{
|
|
"name" : "24054",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/24054"
|
|
},
|
|
{
|
|
"name" : "24014",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/24014"
|
|
},
|
|
{
|
|
"name" : "24083",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/24083"
|
|
},
|
|
{
|
|
"name" : "24048",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/24048"
|
|
},
|
|
{
|
|
"name" : "24129",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/24129"
|
|
},
|
|
{
|
|
"name" : "24203",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/24203"
|
|
},
|
|
{
|
|
"name" : "24648",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/24648"
|
|
},
|
|
{
|
|
"name" : "24950",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/24950"
|
|
},
|
|
{
|
|
"name" : "24930",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/24930"
|
|
},
|
|
{
|
|
"name" : "25402",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/25402"
|
|
},
|
|
{
|
|
"name" : "25649",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/25649"
|
|
},
|
|
{
|
|
"name" : "25715",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/25715"
|
|
},
|
|
{
|
|
"name" : "24284",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/24284"
|
|
},
|
|
{
|
|
"name" : "25482",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/25482"
|
|
},
|
|
{
|
|
"name" : "26909",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/26909"
|
|
},
|
|
{
|
|
"name" : "27706",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/27706"
|
|
},
|
|
{
|
|
"name" : "bind-rrsets-dos(31838)",
|
|
"refsource" : "XF",
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31838"
|
|
}
|
|
]
|
|
}
|
|
}
|