First published: Thu Apr 27 2006(Updated: )
Unspecified vulnerability in ISC BIND allows remote attackers to cause a denial of service via a crafted DNS message with a "broken" TSIG, as demonstrated by the OUSPG PROTOS DNS test suite.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC BIND 9 | =9.0 | |
ISC BIND 9 | =9.0.1 | |
ISC BIND 9 | =9.1 | |
ISC BIND 9 | =9.1.1 | |
ISC BIND 9 | =9.1.2 | |
ISC BIND 9 | =9.1.3 | |
ISC BIND 9 | =9.2.0 | |
ISC BIND 9 | =9.2.1 | |
ISC BIND 9 | =9.2.2 | |
ISC BIND 9 | =9.2.3 | |
ISC BIND 9 | =9.3 | |
ISC BIND 9 | =9.3.1 | |
ISC BIND 9 | =9.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2073 has been classified with a moderate severity due to its potential to cause denial of service.
To mitigate CVE-2006-2073, upgrade to a version of BIND that is not affected, such as BIND 9.3.3 or later.
The impact of CVE-2006-2073 is a denial of service, which can interrupt DNS services.
CVE-2006-2073 affects BIND versions 9.0 through 9.3.2.
CVE-2006-2073 can be exploited by remote attackers capable of sending crafted DNS messages.