// For flags

CVE-2007-2930

ISC BIND 8 - Remote Cache Poisoning

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The (1) NSID_SHUFFLE_ONLY and (2) NSID_USE_POOL PRNG algorithms in ISC BIND 8 before 8.4.7-P1 generate predictable DNS query identifiers when sending outgoing queries such as NOTIFY messages when answering questions as a resolver, which allows remote attackers to poison DNS caches via unknown vectors. NOTE: this issue is different from CVE-2007-2926.

Los algoritmos PRNG (1) NSID_SHUFFLE_ONLY y (2) NSID_USE_POOL en ISC BIND 8 anterior a 8.4.7-P1 generan identificadores de petición DNS predecibles cuando envían peticiones salientes tales como mensajes NOTIFY cuando responden preguntas como resolvedor, lo cual permite a atacantes remotos falsear las cachés DNS a través de vectores desconocido. NOTA: este problema es diferente de CVE-2007-2926.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-05-30 CVE Reserved
  • 2007-08-27 First Exploit
  • 2007-09-12 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
References (30)
URL Tag Source
http://secunia.com/advisories/26629 Third Party Advisory
http://secunia.com/advisories/26858 Third Party Advisory
http://secunia.com/advisories/27433 Third Party Advisory
http://secunia.com/advisories/27459 Third Party Advisory
http://secunia.com/advisories/27465 Third Party Advisory
http://secunia.com/advisories/27696 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-448.htm X_refsource_confirm
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=653968 X_refsource_confirm
http://www.securityfocus.com/archive/1/477870/100/100/threaded Mailing List
http://www.securityfocus.com/archive/1/481424/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/481659/100/0/threaded Mailing List
http://www.securityfocus.com/bid/25459 Vdb Entry
http://www.securitytracker.com/id?1018615 Vdb Entry
http://www.trusteer.com/docs/bind8dns.html X_refsource_misc
http://www.vupen.com/english/advisories/2007/2991 Vdb Entry
http://www.vupen.com/english/advisories/2007/3192 Vdb Entry
http://www.vupen.com/english/advisories/2007/3639 Vdb Entry
http://www.vupen.com/english/advisories/2007/3668 Vdb Entry
http://www.vupen.com/english/advisories/2007/3936 Vdb Entry
http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2007/43/022954-01.pdf X_refsource_confirm
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3975 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2154 Signature
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Isc
Search vendor "Isc"
Bind
Search vendor "Isc" for product "Bind"
<= 8.4.7
Search vendor "Isc" for product "Bind" and version " <= 8.4.7"
-
Affected