Vulnerability Details : CVE-2006-0987
Public exploit exists!
The default configuration of ISC BIND before 9.4.1-P1, when configured as a caching name server, allows recursive queries and provides additional delegation information to arbitrary IP addresses, which allows remote attackers to cause a denial of service (traffic amplification) via DNS queries with spoofed source IP addresses.
Vulnerability category: Denial of service
Products affected by CVE-2006-0987
- cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*
Threat overview for CVE-2006-0987
Top countries where our scanners detected CVE-2006-0987
Top open port discovered on systems with this issue
53
IPs affected by CVE-2006-0987 334
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2006-0987!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2006-0987
1.57%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2006-0987
-
DNS Amplification Scanner
First seen: 2020-04-26auxiliary/scanner/dns/dns_ampThis module can be used to discover DNS servers which expose recursive name lookups which can be used in an amplification attack against a third party. Authors: - xistence <xistence@0x90.nl>
CVSS scores for CVE-2006-0987
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2006-0987
-
http://dns.measurement-factory.com/surveys/sum1.html
DNS ยท Surveys sponsored by Infoblox
-
http://www.securityfocus.com/archive/1/426368/100/0/threaded
-
http://kb.isc.org/article/AA-00269
What has changed in the behavior of "allow-recursion" and "allow-query
-
http://www.us-cert.gov/reading_room/DNS-recursion121605.pdf
Page Not Found | CISAPatch;Vendor Advisory
Jump to