Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-2926

Опубликовано: 24 июл. 2007
Источник: debian
EPSS Средний

Описание

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bind9fixed1:9.4.1-P1-1package

EPSS

Процентиль: 95%
0.19942
Средний

Связанные уязвимости

ubuntu
больше 18 лет назад

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.

redhat
больше 18 лет назад

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.

nvd
больше 18 лет назад

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.

github
почти 4 года назад

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.

oracle-oval
больше 18 лет назад

ELSA-2007-0740: Moderate: bind security update (MODERATE)

EPSS

Процентиль: 95%
0.19942
Средний