CVE-2006-0527
Published: February 2, 2006Last modified: November 10, 2023
Description
BIND 4 (BIND4) and BIND 8 (BIND8), if used as a target forwarder, allows remote attackers to gain privileged access via a "Kashpureff-style DNS cache corruption" attack.
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | bind | Not affected (9.18.16-r0) |
Stream | bind | Not affected (9.18.18-r0) |
References
- http://attrition.org/pipermail/vim/2006-February/000551.html
- http://computerworld.com/networkingtopics/networking/story/0%2C10801%2C103744%2C00.html
- http://secunia.com/advisories/18690
- http://securityreason.com/securityalert/438
- http://securityreason.com/securityalert/748
- http://securitytracker.com/id?1015551
- http://securitytracker.com/id?1015606
- http://www.osvdb.org/22888
- http://www.securityfocus.com/archive/1/425083/100/0/threaded
- http://www.securityfocus.com/bid/16455
- http://www.vupen.com/english/advisories/2006/0399
- http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24414