CVE-2007-0494

N/A Unknown
Published: January 25, 2007 Modified: April 23, 2026
View on NVD

Description

ISC BIND 9.0.x, 9.1.x, 9.2.0 up to 9.2.7, 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (exit) via a type * (ANY) DNS query response that contains multiple RRsets, which triggers an assertion error, aka the "DNSSEC Validation" vulnerability.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://fedoranews.org/cms/node/2507
Source: secalert@redhat.com
http://fedoranews.org/cms/node/2537
Source: secalert@redhat.com
http://secunia.com/advisories/23904
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/23924
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23943
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23944
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23972
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23974
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23977
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24014
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24048
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24054
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24083
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24129
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24203
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24284
Source: secalert@redhat.com
http://secunia.com/advisories/24648
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24930
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24950
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25402
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25482
Source: secalert@redhat.com
http://secunia.com/advisories/25649
Source: secalert@redhat.com
http://secunia.com/advisories/25715
Source: secalert@redhat.com
http://secunia.com/advisories/26909
Source: secalert@redhat.com
http://secunia.com/advisories/27706
Source: secalert@redhat.com
http://securitytracker.com/id?1017573
Source: secalert@redhat.com
http://www.securityfocus.com/bid/22231
Source: secalert@redhat.com
http://www.trustix.org/errata/2007/0005
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-418-1
Source: secalert@redhat.com
https://issues.rpath.com/browse/RPL-989
Source: secalert@redhat.com
http://docs.info.apple.com/article.html?artnum=305530
Source: af854a3a-2127-422b-91ae-364da2661108
http://fedoranews.org/cms/node/2507
Source: af854a3a-2127-422b-91ae-364da2661108
http://fedoranews.org/cms/node/2537
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bind-announce&m=116968519300764&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/23904
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/23924
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23943
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23944
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23972
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23974
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23977
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24014
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24048
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24054
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24083
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24129
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24203
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24284
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/24648
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24930
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24950
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/25402
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/25482
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25649
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25715
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26909
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/27706
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200702-06.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1017573
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102969-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2007-125.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-1.ibm.com/support/docview.wss?uid=isg1IY95618
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-1.ibm.com/support/docview.wss?uid=isg1IY95619
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-1.ibm.com/support/docview.wss?uid=isg1IY96144
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-1.ibm.com/support/docview.wss?uid=isg1IY96324
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2007/dsa-1254
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.isc.org/index.pl?/sw/bind/bind-security.php
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.mandriva.com/security/advisories?name=MDKSA-2007:030
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0044.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0057.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/22231
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.trustix.org/errata/2007/0005
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-418-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/1401
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/1939
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/2002
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/2163
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/2245
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/2315
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/3229
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/31838
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-989
Source: af854a3a-2127-422b-91ae-364da2661108

132 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
41.5%
97th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

isc