Vulnerability Name: CVE-2007-0494 (CCN-31838) Assigned: 2007-01-25 Published: 2007-01-25 Updated: 2017-10-11 Summary: ISC BIND 9.0.x, 9.1.x, 9.2.0 up to 9.2.7, 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (exit) via a type * (ANY) DNS query response that contains multiple RRsets, which triggers an assertion error, aka the "DNSSEC Validation" vulnerability. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P )3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-19 Vulnerability Consequences: Denial of Service References: Source: SGI Type: UNKNOWN20070201-01-P Source: CCN Type: Full-Disclosure Mailing List, Wed Sep 19 2007 - 21:15:23 CDTVMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player Source: MITRE Type: CNACVE-2007-0494 Source: CCN Type: Apple Security Update 2007-005About Security Update 2007-005 Source: CONFIRM Type: UNKNOWNhttp://docs.info.apple.com/article.html?artnum=305530 Source: CCN Type: Apple Web siteApple security updates Source: FEDORA Type: UNKNOWNFEDORA-2007-147 Source: FEDORA Type: UNKNOWNFEDORA-2007-164 Source: NETBSD Type: UNKNOWNNetBSD-SA2007-003 Source: CCN Type: HP Security Bulletin HPSBTU02207 SSRT061239 rev.2HP Tru64 UNIX OpenSSL and BIND Remote Arbitrary Code Execution or Denial of Service (DoS) Source: CCN Type: HP Security Bulletin HPSBUX02219 SSRT061273HP-UX Running BIND, Remote Denial of Service (DoS) Source: HP Type: UNKNOWNSSRT061273 Source: APPLE Type: UNKNOWNAPPLE-SA-2007-05-24 Source: FULLDISC Type: UNKNOWN20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player Source: SUSE Type: UNKNOWNSUSE-SA:2007:014 Source: CCN Type: VMware Security-announce Mailing list, Wed Sep 19 19:15:23 PDT 2007VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player Source: MLIST Type: UNKNOWN[bind-announce] 20070125 Internet Systems Consortium Security Advisory. Source: CCN Type: Internet Systems Consortium Security AdvisoryBIND 9: DNSSEC Validation Source: CCN Type: RHSA-2007-0044Moderate: bind security update Source: CCN Type: RHSA-2007-0057Moderate: bind security update Source: CCN Type: SA23904ISC BIND Denial of Service Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory23904 Source: SECUNIA Type: Vendor Advisory23924 Source: SECUNIA Type: Vendor Advisory23943 Source: SECUNIA Type: Vendor Advisory23944 Source: SECUNIA Type: Vendor Advisory23972 Source: SECUNIA Type: Vendor Advisory23974 Source: SECUNIA Type: Vendor Advisory23977 Source: SECUNIA Type: Vendor Advisory24014 Source: SECUNIA Type: Vendor Advisory24048 Source: SECUNIA Type: Vendor Advisory24054 Source: SECUNIA Type: Vendor Advisory24083 Source: SECUNIA Type: Vendor Advisory24129 Source: SECUNIA Type: Vendor Advisory24203 Source: SECUNIA Type: UNKNOWN24284 Source: CCN Type: SA24648Avaya Products bind Denial of Service Source: SECUNIA Type: Vendor Advisory24648 Source: CCN Type: SA24930HP Tru64 UNIX Multiple SSL and BIND Vulnerabilities Source: SECUNIA Type: Vendor Advisory24930 Source: CCN Type: SA24950HP Insight Management Agents SSL Vulnerabilities Source: SECUNIA Type: Vendor Advisory24950 Source: SECUNIA Type: Vendor Advisory25402 Source: CCN Type: SA25482IBM AIX BIND Denial of Service Vulnerability Source: SECUNIA Type: UNKNOWN25482 Source: SECUNIA Type: UNKNOWN25649 Source: CCN Type: SA25715Sun Solaris 10 BIND DNSSEC Denial of Service Source: SECUNIA Type: UNKNOWN25715 Source: CCN Type: SA26909VMware ESX Server Multiple Security Updates Source: SECUNIA Type: UNKNOWN26909 Source: SECUNIA Type: UNKNOWN27706 Source: FREEBSD Type: UNKNOWNFreeBSD-SA-07:02 Source: GENTOO Type: UNKNOWNGLSA-200702-06 Source: CCN Type: SECTRACK ID: 1017573BIND DNSSEC Validation Bug Lets Remote Users Deny Service Source: SECTRACK Type: UNKNOWN1017573 Source: SLACKWARE Type: UNKNOWNSSA:2007-026-01 Source: CCN Type: Sun Alert ID: 102969Security Vulnerability in Solaris 10 BIND DNSSEC May Cause a Denial of Service Source: SUNALERT Type: UNKNOWN102969 Source: CONFIRM Type: UNKNOWNhttp://support.avaya.com/elmodocs2/security/ASA-2007-125.htm Source: CCN Type: ASA-2007-125bind security update (RHSA-2007-0044) Source: CCN Type: ASA-2007-240HP-UX Running BIND Remote Denial of Service (DoS) (HPSBUX02219) Source: CCN Type: ASA-2007-280Security Vulnerability in Solaris 10 BIND DNSSEC May Cause a Denial of Service (Sun 102969) Source: AIXAPAR Type: UNKNOWNIY95618 Source: CCN Type: IBM APAR IY95618POTENTIAL SECURITY ISSUE IN BOS.NET.TCP.SERVER Source: AIXAPAR Type: UNKNOWNIY95619 Source: CCN Type: IBM APAR IY95619POTENTIAL SECURITY ISSUE IN BOS.NET.TCP.SERVER Source: AIXAPAR Type: UNKNOWNIY96144 Source: CCN Type: IBM APAR IY96144POTENTIAL SECURITY ISSUE IN BOS.NET.TCP.SERVER Source: AIXAPAR Type: UNKNOWNIY96324 Source: CCN Type: IBM APAR IY96324POTENTIAL SECURITY ISSUE IN BOS.NET.TCP.SERVER Source: DEBIAN Type: UNKNOWNDSA-1254 Source: DEBIAN Type: DSA-1254bind9 -- insufficient input sanitising Source: CCN Type: GLSA-200702-06BIND: Denial of Service Source: CONFIRM Type: UNKNOWNhttp://www.isc.org/index.pl?/sw/bind/bind-security.php Source: CONFIRM Type: Patchhttp://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8 Source: CONFIRM Type: Patchhttp://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4 Source: CCN Type: Internet Software Consortium (ISC) Web siteBIND (Berkeley Internet Name Domain) page Source: MANDRIVA Type: UNKNOWNMDKSA-2007:030 Source: CCN Type: OpenPKG-SA-2007.007bind Source: OPENPKG Type: UNKNOWNOpenPKG-SA-2007.007 Source: REDHAT Type: UNKNOWNRHSA-2007:0044 Source: REDHAT Type: UNKNOWNRHSA-2007:0057 Source: BID Type: UNKNOWN22231 Source: CCN Type: BID-22231ISC BIND Remote DNSSEC Validation Denial of Service Vulnerability Source: TRUSTIX Type: UNKNOWN2007-0005 Source: CCN Type: TLSA-2007-9bind denial of service attack Source: CCN Type: USN-418-1Bind vulnerabilities Source: UBUNTU Type: UNKNOWNUSN-418-1 Source: CCN Type: VMware, Inc. Web siteDownload Patch ESX-1001725 for VMware ESX Server 3.0.2 Source: VUPEN Type: UNKNOWNADV-2007-1401 Source: VUPEN Type: UNKNOWNADV-2007-1939 Source: VUPEN Type: UNKNOWNADV-2007-2002 Source: VUPEN Type: UNKNOWNADV-2007-2163 Source: VUPEN Type: UNKNOWNADV-2007-2245 Source: VUPEN Type: UNKNOWNADV-2007-2315 Source: VUPEN Type: UNKNOWNADV-2007-3229 Source: XF Type: UNKNOWNbind-rrsets-dos(31838) Source: XF Type: UNKNOWNbind-rrsets-dos(31838) Source: CONFIRM Type: UNKNOWNhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488 Source: CCN Type: rPSA-2007-0021-1 bind bind-utilsbind: various security flaws CVE-2007-0493 CVE-2007-0494 Source: CONFIRM Type: UNKNOWNhttps://issues.rpath.com/browse/RPL-989 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:11523 Source: SUSE Type: SUSE-SA:2007:014bind remote denial of service problem Source: HP Type: UNKNOWNSSRT071304 Vulnerable Configuration: Configuration 1 :cpe:/a:isc:bind:9.0:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.0.0:rc1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.0.0:rc2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.0.0:rc3:*:*:-:*:*:* OR cpe:/a:isc:bind:9.0.0:rc4:*:*:-:*:*:* OR cpe:/a:isc:bind:9.0.0:rc5:*:*:-:*:*:* OR cpe:/a:isc:bind:9.0.0:rc6:*:*:-:*:*:* OR cpe:/a:isc:bind:9.0.1:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.0.1:rc1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.0.1:rc2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.1:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.1.0:rc1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.1.1:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.1.1:rc1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.1.1:rc2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.1.1:rc3:*:*:-:*:*:* OR cpe:/a:isc:bind:9.1.1:rc4:*:*:-:*:*:* OR cpe:/a:isc:bind:9.1.1:rc5:*:*:-:*:*:* OR cpe:/a:isc:bind:9.1.1:rc6:*:*:-:*:*:* OR cpe:/a:isc:bind:9.1.1:rc7:*:*:-:*:*:* OR cpe:/a:isc:bind:9.1.2:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.1.2:rc1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.1.3:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.1.3:rc1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.1.3:rc2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.1.3:rc3:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.0:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.0:a1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.0:a2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.0:a3:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.0:b1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.0:b2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.0:rc1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.0:rc10:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.0:rc2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.0:rc3:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.0:rc4:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.0:rc5:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.0:rc6:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.0:rc7:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.0:rc8:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.0:rc9:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.1:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.1:rc1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.1:rc2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.2:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.2:p2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.2:p3:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.2:rc1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.3:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.3:rc1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.3:rc2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.3:rc3:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.3:rc4:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.4:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.4:rc2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.4:rc3:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.4:rc4:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.4:rc5:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.4:rc6:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.4:rc7:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.4:rc8:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.5:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.5:b2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.5:rc1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.6:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.2.6:rc1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3.0:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3.0:b2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3.0:b3:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3.0:b4:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3.0:rc1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3.0:rc2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3.0:rc3:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3.0:rc4:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3.1:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3.1:b2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3.1:rc1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3.2:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3.2:rc1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:a1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:a2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:a3:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:a4:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:a5:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:b1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:b2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:b3:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:rc1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.5.0:a1:*:*:-:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:* Configuration RedHat 9 :cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1 :cpe:/a:isc:bind:9.3.0:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3.1:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3.2:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.3.3:*:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:a1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:a2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:a3:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:a4:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:a5:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:a6:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:b1:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:b2:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:b3:*:*:-:*:*:* OR cpe:/a:isc:bind:9.4.0:b4:*:*:-:*:*:* OR cpe:/a:isc:bind:9.5.0:a1:*:*:-:*:*:* AND cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.23:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/a:suse:suse_linux_school_server:-:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:ibm:aix:5.3:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:10::sparc:*:*:*:*:* OR cpe:/o:sun:solaris:10::x86:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:* OR cpe:/o:compaq:tru64:4.0g_pk4_bl22:*:*:*:*:*:*:* OR cpe:/o:compaq:tru64:4.0f_pk8_bl22:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
isc bind 9.0
isc bind 9.0.0 rc1
isc bind 9.0.0 rc2
isc bind 9.0.0 rc3
isc bind 9.0.0 rc4
isc bind 9.0.0 rc5
isc bind 9.0.0 rc6
isc bind 9.0.1
isc bind 9.0.1 rc1
isc bind 9.0.1 rc2
isc bind 9.1
isc bind 9.1.0 rc1
isc bind 9.1.1
isc bind 9.1.1 rc1
isc bind 9.1.1 rc2
isc bind 9.1.1 rc3
isc bind 9.1.1 rc4
isc bind 9.1.1 rc5
isc bind 9.1.1 rc6
isc bind 9.1.1 rc7
isc bind 9.1.2
isc bind 9.1.2 rc1
isc bind 9.1.3
isc bind 9.1.3 rc1
isc bind 9.1.3 rc2
isc bind 9.1.3 rc3
isc bind 9.2
isc bind 9.2.0
isc bind 9.2.0 a1
isc bind 9.2.0 a2
isc bind 9.2.0 a3
isc bind 9.2.0 b1
isc bind 9.2.0 b2
isc bind 9.2.0 rc1
isc bind 9.2.0 rc10
isc bind 9.2.0 rc2
isc bind 9.2.0 rc3
isc bind 9.2.0 rc4
isc bind 9.2.0 rc5
isc bind 9.2.0 rc6
isc bind 9.2.0 rc7
isc bind 9.2.0 rc8
isc bind 9.2.0 rc9
isc bind 9.2.1
isc bind 9.2.1 rc1
isc bind 9.2.1 rc2
isc bind 9.2.2
isc bind 9.2.2 p2
isc bind 9.2.2 p3
isc bind 9.2.2 rc1
isc bind 9.2.3
isc bind 9.2.3 rc1
isc bind 9.2.3 rc2
isc bind 9.2.3 rc3
isc bind 9.2.3 rc4
isc bind 9.2.4
isc bind 9.2.4 rc2
isc bind 9.2.4 rc3
isc bind 9.2.4 rc4
isc bind 9.2.4 rc5
isc bind 9.2.4 rc6
isc bind 9.2.4 rc7
isc bind 9.2.4 rc8
isc bind 9.2.5
isc bind 9.2.5 b2
isc bind 9.2.5 rc1
isc bind 9.2.6
isc bind 9.2.6 rc1
isc bind 9.3
isc bind 9.3.0
isc bind 9.3.0 b2
isc bind 9.3.0 b3
isc bind 9.3.0 b4
isc bind 9.3.0 rc1
isc bind 9.3.0 rc2
isc bind 9.3.0 rc3
isc bind 9.3.0 rc4
isc bind 9.3.1
isc bind 9.3.1 b2
isc bind 9.3.1 rc1
isc bind 9.3.2
isc bind 9.3.2 rc1
isc bind 9.4.0 a1
isc bind 9.4.0 a2
isc bind 9.4.0 a3
isc bind 9.4.0 a4
isc bind 9.4.0 a5
isc bind 9.4.0 b1
isc bind 9.4.0 b2
isc bind 9.4.0 b3
isc bind 9.4.0 rc1
isc bind 9.5.0 a1
isc bind 9.3.0
isc bind 9.3.1
isc bind 9.3.2
isc bind 9.3.3
isc bind 9.4.0 a1
isc bind 9.4.0 a2
isc bind 9.4.0 a3
isc bind 9.4.0 a4
isc bind 9.4.0 a5
isc bind 9.4.0 a6
isc bind 9.4.0 b1
isc bind 9.4.0 b2
isc bind 9.4.0 b3
isc bind 9.4.0 b4
isc bind 9.5.0 a1
hp hp-ux 11.11
openpkg openpkg current
gentoo linux *
suse linux enterprise server 8
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
hp hp-ux 11.23
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
suse suse linux school server -
redhat enterprise linux 3
ibm aix 5.3
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
novell linux desktop 9
redhat enterprise linux 4
redhat enterprise linux 4
apple mac os x 10.3.9
apple mac os x server 10.3.9
debian debian linux 3.1
novell open enterprise server *
mandrakesoft mandrake multi network firewall 2.0
sun solaris 10
sun solaris 10
suse suse linux 10.0
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 2006
compaq tru64 4.0g_pk4_bl22
compaq tru64 4.0f_pk8_bl22
canonical ubuntu 6.06
suse suse linux 10.1
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 3.0
turbolinux turbolinux fuji
turbolinux turbolinux personal *
turbolinux turbolinux home *
turbolinux turbolinux multimedia *
redhat enterprise linux desktop 5.0
redhat enterprise linux 5
redhat enterprise linux 5
apple mac os x server 10.4.9
apple mac os x 10.4.9
redhat enterprise linux 5
novell open enterprise server *
novell opensuse 10.2
suse suse linux 9.3