4.3
CVSSv2

CVE-2007-2930

Published: 12/09/2007 Updated: 16/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 440
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The (1) NSID_SHUFFLE_ONLY and (2) NSID_USE_POOL PRNG algorithms in ISC BIND 8 prior to 8.4.7-P1 generate predictable DNS query identifiers when sending outgoing queries such as NOTIFY messages when answering questions as a resolver, which allows remote malicious users to poison DNS caches via unknown vectors. NOTE: this issue is different from CVE-2007-2926.

Vulnerable Product Search on Vulmon Subscribe to Product

isc bind

Exploits

source: wwwsecurityfocuscom/bid/25459/info BIND 8 is prone to a remote cache-poisoning vulnerability because of weaknesses in its random-number generator An attacker may leverage this issue to manipulate cache data, potentially facilitating man-in-the-middle, site-impersonation, or denial-of-service attacks Versions of BIND from 8 ...
#source: wwwsecurityfocuscom/bid/25459/info # #BIND 8 is prone to a remote cache-poisoning vulnerability because of weaknesses in its random-number generator # #An attacker may leverage this issue to manipulate cache data, potentially facilitating man-in-the-middle, site-impersonation, or denial-of-service attacks # #Versions of BIND fro ...

References

NVD-CWE-Otherhttp://www.trusteer.com/docs/bind8dns.htmlhttp://www.isc.org/index.pl?/sw/bind/bind8-eol.phphttp://www.kb.cert.org/vuls/id/927905http://www.ciac.org/ciac/bulletins/r-333.shtmlhttp://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=653968http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2007/43/022954-01.pdfhttp://support.avaya.com/elmodocs2/security/ASA-2007-448.htmhttp://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3975http://sunsolve.sun.com/search/document.do?assetkey=1-26-103063-1http://www.securityfocus.com/bid/25459http://www.securitytracker.com/id?1018615http://secunia.com/advisories/26629http://secunia.com/advisories/26858http://secunia.com/advisories/27433http://secunia.com/advisories/27459http://secunia.com/advisories/27465http://secunia.com/advisories/27696http://sunsolve.sun.com/search/document.do?assetkey=1-66-200859-1http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01283837http://www.vupen.com/english/advisories/2007/3192http://www.vupen.com/english/advisories/2007/3668http://www.vupen.com/english/advisories/2007/2991http://www.vupen.com/english/advisories/2007/3639http://www.vupen.com/english/advisories/2007/3936https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2154http://www.securityfocus.com/archive/1/481659/100/0/threadedhttp://www.securityfocus.com/archive/1/481424/100/0/threadedhttp://www.securityfocus.com/archive/1/477870/100/100/threadedhttps://nvd.nist.govhttps://www.exploit-db.com/exploits/30536/https://www.kb.cert.org/vuls/id/927905