Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-0527

Опубликовано: 02 фев. 2006
Источник: debian
EPSS Низкий

Описание

BIND 4 (BIND4) and BIND 8 (BIND8), if used as a target forwarder, allows remote attackers to gain privileged access via a "Kashpureff-style DNS cache corruption" attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bindfixed1:8.4.7-1package
bindno-dsasargepackage

Примечания

  • BIND 8 is unsuitable for forwarder use because of its

  • architecture. Upgrade to BIND 9 as a fix.

  • This was fixed in sid by documenting it as an unfixable design limitation

EPSS

Процентиль: 91%
0.06541
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

BIND 4 (BIND4) and BIND 8 (BIND8), if used as a target forwarder, allows remote attackers to gain privileged access via a "Kashpureff-style DNS cache corruption" attack.

nvd
больше 19 лет назад

BIND 4 (BIND4) and BIND 8 (BIND8), if used as a target forwarder, allows remote attackers to gain privileged access via a "Kashpureff-style DNS cache corruption" attack.

github
больше 3 лет назад

BIND 4 (BIND4) and BIND 8 (BIND8), if used as a target forwarder, allows remote attackers to gain privileged access via a "Kashpureff-style DNS cache corruption" attack.

EPSS

Процентиль: 91%
0.06541
Низкий