{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2007-2926", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20070724 Re: \"BIND 9 DNS Cache Poisoning\" by Amit Klein (Trusteer)", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/474545/100/0/threaded" }, { "name" : "20070726 Re: \"BIND 9 DNS Cache Poisoning\" by Amit Klein (Trusteer)", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/474808/100/0/threaded" }, { "name" : "20070727 Re: \"BIND 9 DNS Cache Poisoning\" by Amit Klein (Trusteer)", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/474856/100/0/threaded" }, { "name" : "20070724 \"BIND 9 DNS Cache Poisoning\" by Amit Klein (Trusteer)", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/474516/100/0/threaded" }, { "name" : "http://www.securiteam.com/securitynews/5VP0L0UM0A.html", "refsource" : "MISC", "url" : "http://www.securiteam.com/securitynews/5VP0L0UM0A.html" }, { "name" : "http://www.trusteer.com/docs/bind9dns.html", "refsource" : "MISC", "url" : "http://www.trusteer.com/docs/bind9dns.html" }, { "name" : "http://www.trusteer.com/docs/bind9dns_s.html", "refsource" : "MISC", "url" : "http://www.trusteer.com/docs/bind9dns_s.html" }, { "name" : "http://www.isc.org/index.pl?/sw/bind/bind-security.php", "refsource" : "CONFIRM", "url" : "http://www.isc.org/index.pl?/sw/bind/bind-security.php" }, { "name" : "https://issues.rpath.com/browse/RPL-1587", "refsource" : "CONFIRM", "url" : "https://issues.rpath.com/browse/RPL-1587" }, { "name" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=623903", "refsource" : "CONFIRM", "url" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=623903" }, { "name" : "ftp://aix.software.ibm.com/aix/efixes/security/README", "refsource" : "CONFIRM", "url" : "ftp://aix.software.ibm.com/aix/efixes/security/README" }, { "name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-389.htm", "refsource" : "CONFIRM", "url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-389.htm" }, { "name" : "http://docs.info.apple.com/article.html?artnum=307041", "refsource" : "CONFIRM", "url" : "http://docs.info.apple.com/article.html?artnum=307041" }, { "name" : "IZ02218", "refsource" : "AIXAPAR", "url" : "http://www-1.ibm.com/support/search.wss?rs=0&q=IZ02218&apar=only" }, { "name" : "IZ02219", "refsource" : "AIXAPAR", "url" : "http://www-1.ibm.com/support/search.wss?rs=0&q=IZ02219&apar=only" }, { "name" : "APPLE-SA-2007-11-14", "refsource" : "APPLE", "url" : "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html" }, { "name" : "DSA-1341", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2007/dsa-1341" }, { "name" : "FreeBSD-SA-07:07", "refsource" : "FREEBSD", "url" : "http://security.freebsd.org/advisories/FreeBSD-SA-07:07.bind.asc" }, { "name" : "GLSA-200708-13", "refsource" : "GENTOO", "url" : "http://www.gentoo.org/security/en/glsa/glsa-200708-13.xml" }, { "name" : "HPSBUX02251", "refsource" : "HP", "url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426" }, { "name" : "SSRT071449", "refsource" : "HP", "url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426" }, { "name" : "HPSBOV02261", "refsource" : "HP", "url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01174368" }, { "name" : "HPSBTU02256", "refsource" : "HP", "url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01154600" }, { "name" : "HPSBOV03226", "refsource" : "HP", "url" : "http://marc.info/?l=bugtraq&m=141879471518471&w=2" }, { "name" : "SSRT101004", "refsource" : "HP", "url" : "http://marc.info/?l=bugtraq&m=141879471518471&w=2" }, { "name" : "MDKSA-2007:149", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:149" }, { "name" : "OpenPKG-SA-2007.022", "refsource" : "OPENPKG", "url" : "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.022.html" }, { "name" : "RHSA-2007:0740", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2007-0740.html" }, { "name" : "20070801-01-P", "refsource" : "SGI", "url" : "ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc" }, { "name" : "SSA:2007-207-01", "refsource" : "SLACKWARE", "url" : "http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.521385" }, { "name" : "103018", "refsource" : "SUNALERT", "url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103018-1" }, { "name" : "SUSE-SA:2007:047", "refsource" : "SUSE", "url" : "http://www.novell.com/linux/security/advisories/2007_47_bind.html" }, { "name" : "2007-0023", "refsource" : "TRUSTIX", "url" : "http://www.trustix.org/errata/2007/0023/" }, { "name" : "USN-491-1", "refsource" : "UBUNTU", "url" : "http://www.ubuntu.com/usn/usn-491-1" }, { "name" : "TA07-319A", "refsource" : "CERT", "url" : "http://www.us-cert.gov/cas/techalerts/TA07-319A.html" }, { "name" : "VU#252735", "refsource" : "CERT-VN", "url" : "http://www.kb.cert.org/vuls/id/252735" }, { "name" : "25037", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/25037" }, { "name" : "26444", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/26444" }, { "name" : "oval:org.mitre.oval:def:10293", "refsource" : "OVAL", "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10293" }, { "name" : "ADV-2007-2627", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/2627" }, { "name" : "ADV-2007-2662", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/2662" }, { "name" : "ADV-2007-2782", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/2782" }, { "name" : "ADV-2007-2914", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/2914" }, { "name" : "ADV-2007-2932", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/2932" }, { "name" : "ADV-2007-3242", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/3242" }, { "name" : "ADV-2007-3868", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/3868" }, { "name" : "oval:org.mitre.oval:def:2226", "refsource" : "OVAL", "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2226" }, { "name" : "1018442", "refsource" : "SECTRACK", "url" : "http://www.securitytracker.com/id?1018442" }, { "name" : "26152", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26152" }, { "name" : "26195", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26195" }, { "name" : "26160", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26160" }, { "name" : "26227", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26227" }, { "name" : "26148", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26148" }, { "name" : "26231", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26231" }, { "name" : "26330", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26330" }, { "name" : "26261", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26261" }, { "name" : "26308", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26308" }, { "name" : "26509", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26509" }, { "name" : "26515", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26515" }, { "name" : "26531", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26531" }, { "name" : "26607", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26607" }, { "name" : "26847", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26847" }, { "name" : "26925", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26925" }, { "name" : "26180", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26180" }, { "name" : "26217", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26217" }, { "name" : "26236", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26236" }, { "name" : "26605", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26605" }, { "name" : "27643", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/27643" }, { "name" : "isc-bind-queryid-spoofing(35575)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35575" } ] } }