Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2007-0740

Опубликовано: 24 июл. 2007
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2007-0740: Moderate: bind security update (MODERATE)

[9.2.4-27.0.1.el4]

  • fixed cryptographically weak query id generator (CVE-2007-2926)

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

bind

9.3.3-9.0.1.el5

bind-chroot

9.3.3-9.0.1.el5

bind-devel

9.3.3-9.0.1.el5

bind-libbind-devel

9.3.3-9.0.1.el5

bind-libs

9.3.3-9.0.1.el5

bind-sdb

9.3.3-9.0.1.el5

bind-utils

9.3.3-9.0.1.el5

caching-nameserver

9.3.3-9.0.1.el5

Oracle Linux i386

bind

9.3.3-9.0.1.el5

bind-chroot

9.3.3-9.0.1.el5

bind-devel

9.3.3-9.0.1.el5

bind-libbind-devel

9.3.3-9.0.1.el5

bind-libs

9.3.3-9.0.1.el5

bind-sdb

9.3.3-9.0.1.el5

bind-utils

9.3.3-9.0.1.el5

caching-nameserver

9.3.3-9.0.1.el5

Связанные CVE

Связанные уязвимости

ubuntu
почти 18 лет назад

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.

redhat
почти 18 лет назад

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.

nvd
почти 18 лет назад

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.

debian
почти 18 лет назад

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during ...

github
около 3 лет назад

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.