// For flags

CVE-2007-2930

ISC BIND 8 - Remote Cache Poisoning

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The (1) NSID_SHUFFLE_ONLY and (2) NSID_USE_POOL PRNG algorithms in ISC BIND 8 before 8.4.7-P1 generate predictable DNS query identifiers when sending outgoing queries such as NOTIFY messages when answering questions as a resolver, which allows remote attackers to poison DNS caches via unknown vectors. NOTE: this issue is different from CVE-2007-2926.

Los algoritmos PRNG (1) NSID_SHUFFLE_ONLY y (2) NSID_USE_POOL en ISC BIND 8 anterior a 8.4.7-P1 generan identificadores de petición DNS predecibles cuando envían peticiones salientes tales como mensajes NOTIFY cuando responden preguntas como resolvedor, lo cual permite a atacantes remotos falsear las cachés DNS a través de vectores desconocido. NOTA: este problema es diferente de CVE-2007-2926.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-05-30 CVE Reserved
  • 2007-08-27 First Exploit
  • 2007-09-12 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-23 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
References (30)
URL Tag Source
http://secunia.com/advisories/26629 Third Party Advisory
http://secunia.com/advisories/26858 Third Party Advisory
http://secunia.com/advisories/27433 Third Party Advisory
http://secunia.com/advisories/27459 Third Party Advisory
http://secunia.com/advisories/27465 Third Party Advisory
http://secunia.com/advisories/27696 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-448.htm X_refsource_confirm
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=653968 X_refsource_confirm
http://www.securityfocus.com/archive/1/477870/100/100/threaded Mailing List
http://www.securityfocus.com/archive/1/481424/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/481659/100/0/threaded Mailing List
http://www.securityfocus.com/bid/25459 Vdb Entry
http://www.securitytracker.com/id?1018615 Vdb Entry
http://www.trusteer.com/docs/bind8dns.html X_refsource_misc
http://www.vupen.com/english/advisories/2007/2991 Vdb Entry
http://www.vupen.com/english/advisories/2007/3192 Vdb Entry
http://www.vupen.com/english/advisories/2007/3639 Vdb Entry
http://www.vupen.com/english/advisories/2007/3668 Vdb Entry
http://www.vupen.com/english/advisories/2007/3936 Vdb Entry
http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2007/43/022954-01.pdf X_refsource_confirm
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3975 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2154 Signature
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Isc
Search vendor "Isc"
Bind
Search vendor "Isc" for product "Bind"
<= 8.4.7
Search vendor "Isc" for product "Bind" and version " <= 8.4.7"
-
Affected