Vulnerabilities > CVE-2006-2073 - Denial Of Service vulnerability in ISC BIND TSIG Zone Transfer

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
isc
nessus

Summary

Unspecified vulnerability in ISC BIND allows remote attackers to cause a denial of service via a crafted DNS message with a "broken" TSIG, as demonstrated by the OUSPG PROTOS DNS test suite.

Nessus

NASL familyDNS
NASL idBIND9_DOS2.NASL
descriptionThe version of BIND installed on the remote host suggests that it suffers from multiple denial of service vulnerabilities that could be triggered by either by sending a large volume of recursive queries or queries for SIG records where there are multiple SIG(covered) RRsets. Note that Nessus obtained the version by sending a special DNS request for the text
last seen2020-06-01
modified2020-06-02
plugin id22311
published2006-09-07
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/22311
titleISC BIND 9 Multiple Remote DoS

Statements

contributorMark J Cox
lastmodified2007-07-19
organizationRed Hat
statementThis issue did not affect the version of bind as shipped with Red Hat Enterprise Linux 5. We do not believe this issue has a security consequence for earlier versions of Red Hat Enterprise Linux. For details please see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=192192