CVE-2007-2926
Published Jul 24, 2007
Last updated 6 years ago
Overview
- Description
- ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.
- Source
- cret@cert.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Vendor comments
- Red HatUpdates are available for Red Hat Enterprise Linux 2.1, 3, 4, and 5 to correct this issue: http://rhn.redhat.com/errata/RHSA-2007-0740.html
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C52373DC-3E05-424B-9C78-4092A75C75A0" }, { "criteria": "cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1861756C-CC81-4EAB-8427-57A3C62BFF96" }, { "criteria": "cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F947835-8E96-4793-B81E-EEC103BF0CB3" }, { "criteria": "cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FA93166-513D-40AA-9855-FC89060BA03C" }, { "criteria": "cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C8B18D7-4D15-46A7-8013-E6267127A427" }, { "criteria": "cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A944178-032B-4637-842D-BC6B227043A3" }, { "criteria": "cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32CEF8AD-9EE7-4ADA-888E-883751962529" } ], "operator": "OR" } ] } ]