CVE-2006-2073 Affecting bind9 package, versions <1:9.3.3-1
Threat Intelligence
EPSS
8.16% (95th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-BIND9-346588
- published 27 Apr 2006
- disclosed 27 Apr 2006
Introduced: 27 Apr 2006
CVE-2006-2073 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
bind9
to version 1:9.3.3-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind9
package and not the bind9
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
Unspecified vulnerability in ISC BIND allows remote attackers to cause a denial of service via a crafted DNS message with a "broken" TSIG, as demonstrated by the OUSPG PROTOS DNS test suite.
References
- https://security-tracker.debian.org/tracker/CVE-2006-2073
- http://www.kb.cert.org/vuls/id/955777
- http://securitytracker.com/id?1015993
- http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en
- http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en
- http://www.vupen.com/english/advisories/2006/1505
- http://www.vupen.com/english/advisories/2006/1537
- http://secunia.com/advisories/19808
- http://www.securityfocus.com/bid/17692
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26081
CVSS Scores
version 3.1