This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Apple First view 2008-09-10
Product Bonjour Last view 2020-02-05
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:apple:bonjour:1.0.4:unknown:windows:*:*:*:*:* 3
cpe:2.3:a:apple:bonjour:*:*:*:*:*:*:*:* 1

Related : CVE

  Date Alert Description
5.5 2020-02-05 CVE-2011-0220

Apple Bonjour before 2011 allows a crash via a crafted multicast DNS packet.

6.4 2008-09-10 CVE-2008-3630

mDNSResponder in Apple Bonjour for Windows before 1.0.5, when an application uses the Bonjour API for unicast DNS, does not choose random values for transaction IDs or source ports in DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.

5 2008-09-10 CVE-2008-2326

mDNSResponder in the Bonjour Namespace Provider in Apple Bonjour for Windows before 1.0.5 allows attackers to cause a denial of service (NULL pointer dereference and application crash) by resolving a crafted .local domain name that contains a long label.

CWE : Common Weakness Enumeration

%idName
100% (2) CWE-20 Improper Input Validation

Open Source Vulnerability Database (OSVDB)

id Description
48020 Apple Bonjour for Windows mDNSResponder Bonjour API for Unicast DNS Transacti...
48019 Apple Bonjour for Windows Bonjour Namespace Provider mDNSResponder Domain Nam...

OpenVAS Exploits

id Description
2012-02-12 Name : Gentoo Security Advisory GLSA 201201-05 (mDNSResponder)
File : nvt/glsa_201201_05.nasl

Nessus® Vulnerability Scanner

id Description
2012-01-23 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201201-05.nasl - Type: ACT_GATHER_INFO
2008-09-18 Name: The remote Windows host has an application that is affected by multiple vulne...
File: bonjour_1_0_5.nasl - Type: ACT_GATHER_INFO