CVE-2006-0987Bind vulnerability

7 documents7 sources
Severity
5.0MEDIUMNVD
EPSS
36.9%
top 2.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 3
Latest updateMay 1

Description

The default configuration of ISC BIND before 9.4.1-P1, when configured as a caching name server, allows recursive queries and provides additional delegation information to arbitrary IP addresses, which allows remote attackers to cause a denial of service (traffic amplification) via DNS queries with spoofed source IP addresses.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages2 packages

Debianisc/bind9< 1:9.4.0-1+3
NVDisc/bind9.3.2

Patches

🔴Vulnerability Details

3
GHSA
GHSA-rmj9-c82h-2f4h: The default configuration of ISC BIND before 92022-05-01
CVEList
CVE-2006-0987: The default configuration of ISC BIND before 92006-03-03
OSV
CVE-2006-0987: The default configuration of ISC BIND before 92006-03-03

📋Vendor Advisories

2
Red Hat
bind: DDoS (traffic amplification) via DNS queries with spoofed IP addresses due to additional information delegation to arbitrary IP addresses2006-03-03
Debian
CVE-2006-0987: bind9 - The default configuration of ISC BIND before 9.4.1-P1, when configured as a cach...2006

💬Community

1
Bugzilla
CVE-2006-0987 bind: DDoS (traffic amplification) via DNS queries with spoofed IP addresses due to additional information delegation to arbitrary IP addresses2012-11-06
CVE-2006-0987 — ISC Bind vulnerability | cvebase