Vulnerability Details : CVE-2006-2073
Unspecified vulnerability in ISC BIND allows remote attackers to cause a denial of service via a crafted DNS message with a "broken" TSIG, as demonstrated by the OUSPG PROTOS DNS test suite.
Vulnerability category: Denial of service
Threat overview for CVE-2006-2073
Top countries where our scanners detected CVE-2006-2073
Top open port discovered on systems with this issue
53
IPs affected by CVE-2006-2073 3,098
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2006-2073!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2006-2073
Probability of exploitation activity in the next 30 days: 8.16%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 93 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-2073
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
Vendor statements for CVE-2006-2073
-
Red Hat 2007-07-19This issue did not affect the version of bind as shipped with Red Hat Enterprise Linux 5. We do not believe this issue has a security consequence for earlier versions of Red Hat Enterprise Linux. For details please see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=192192
-
http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en
Vendor Advisory
- http://www.vupen.com/english/advisories/2006/1505
-
http://securitytracker.com/id?1015993
-
http://www.kb.cert.org/vuls/id/955777
US Government Resource
-
http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en
Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26081
-
http://www.securityfocus.com/bid/17692
-
http://www.vupen.com/english/advisories/2006/1537
- cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*