Summary
Detail | |||
---|---|---|---|
Vendor | Apple | First view | 2008-09-10 |
Product | Bonjour | Last view | 2020-02-05 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:a:apple:bonjour:1.0.4:unknown:windows:*:*:*:*:* | 3 |
cpe:2.3:a:apple:bonjour:*:*:*:*:*:*:*:* | 1 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.5 | 2020-02-05 | CVE-2011-0220 | Apple Bonjour before 2011 allows a crash via a crafted multicast DNS packet. |
6.4 | 2008-09-10 | CVE-2008-3630 | mDNSResponder in Apple Bonjour for Windows before 1.0.5, when an application uses the Bonjour API for unicast DNS, does not choose random values for transaction IDs or source ports in DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. |
5 | 2008-09-10 | CVE-2008-2326 | mDNSResponder in the Bonjour Namespace Provider in Apple Bonjour for Windows before 1.0.5 allows attackers to cause a denial of service (NULL pointer dereference and application crash) by resolving a crafted .local domain name that contains a long label. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (2) | CWE-20 | Improper Input Validation |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
48020 | Apple Bonjour for Windows mDNSResponder Bonjour API for Unicast DNS Transacti... |
48019 | Apple Bonjour for Windows Bonjour Namespace Provider mDNSResponder Domain Nam... |
OpenVAS Exploits
id | Description |
---|---|
2012-02-12 | Name : Gentoo Security Advisory GLSA 201201-05 (mDNSResponder) File : nvt/glsa_201201_05.nasl |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2012-01-23 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201201-05.nasl - Type: ACT_GATHER_INFO |
2008-09-18 | Name: The remote Windows host has an application that is affected by multiple vulne... File: bonjour_1_0_5.nasl - Type: ACT_GATHER_INFO |