Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f6h8-pjrf-562j

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.

Ссылки

EPSS

Процентиль: 94%
0.15044
Средний

Связанные уязвимости

ubuntu
почти 18 лет назад

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.

redhat
почти 18 лет назад

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.

nvd
почти 18 лет назад

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.

debian
почти 18 лет назад

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during ...

oracle-oval
почти 18 лет назад

ELSA-2007-0740: Moderate: bind security update (MODERATE)

EPSS

Процентиль: 94%
0.15044
Средний