fkie_cve-2007-2926
Vulnerability from fkie_nvd
Published
2007-07-24 17:30
Modified
2024-11-21 00:31
Severity ?
Summary
ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.
References
cret@cert.orgftp://aix.software.ibm.com/aix/efixes/security/README
cret@cert.orgftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc
cret@cert.orghttp://docs.info.apple.com/article.html?artnum=307041
cret@cert.orghttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426
cret@cert.orghttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426
cret@cert.orghttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01154600
cret@cert.orghttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01174368
cret@cert.orghttp://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html
cret@cert.orghttp://marc.info/?l=bugtraq&m=141879471518471&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=141879471518471&w=2
cret@cert.orghttp://secunia.com/advisories/26148
cret@cert.orghttp://secunia.com/advisories/26152Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/26160
cret@cert.orghttp://secunia.com/advisories/26180
cret@cert.orghttp://secunia.com/advisories/26195
cret@cert.orghttp://secunia.com/advisories/26217
cret@cert.orghttp://secunia.com/advisories/26227
cret@cert.orghttp://secunia.com/advisories/26231
cret@cert.orghttp://secunia.com/advisories/26236
cret@cert.orghttp://secunia.com/advisories/26261
cret@cert.orghttp://secunia.com/advisories/26308
cret@cert.orghttp://secunia.com/advisories/26330
cret@cert.orghttp://secunia.com/advisories/26509
cret@cert.orghttp://secunia.com/advisories/26515
cret@cert.orghttp://secunia.com/advisories/26531
cret@cert.orghttp://secunia.com/advisories/26605
cret@cert.orghttp://secunia.com/advisories/26607
cret@cert.orghttp://secunia.com/advisories/26847
cret@cert.orghttp://secunia.com/advisories/26925
cret@cert.orghttp://secunia.com/advisories/27643
cret@cert.orghttp://security.freebsd.org/advisories/FreeBSD-SA-07:07.bind.asc
cret@cert.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103018-1
cret@cert.orghttp://support.avaya.com/elmodocs2/security/ASA-2007-389.htm
cret@cert.orghttp://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=623903
cret@cert.orghttp://www-1.ibm.com/support/search.wss?rs=0&q=IZ02218&apar=only
cret@cert.orghttp://www-1.ibm.com/support/search.wss?rs=0&q=IZ02219&apar=only
cret@cert.orghttp://www.debian.org/security/2007/dsa-1341
cret@cert.orghttp://www.gentoo.org/security/en/glsa/glsa-200708-13.xml
cret@cert.orghttp://www.isc.org/index.pl?/sw/bind/bind-security.php
cret@cert.orghttp://www.kb.cert.org/vuls/id/252735US Government Resource
cret@cert.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:149
cret@cert.orghttp://www.novell.com/linux/security/advisories/2007_47_bind.html
cret@cert.orghttp://www.openpkg.com/security/advisories/OpenPKG-SA-2007.022.html
cret@cert.orghttp://www.redhat.com/support/errata/RHSA-2007-0740.html
cret@cert.orghttp://www.securiteam.com/securitynews/5VP0L0UM0A.html
cret@cert.orghttp://www.securityfocus.com/archive/1/474516/100/0/threaded
cret@cert.orghttp://www.securityfocus.com/archive/1/474545/100/0/threaded
cret@cert.orghttp://www.securityfocus.com/archive/1/474808/100/0/threaded
cret@cert.orghttp://www.securityfocus.com/archive/1/474856/100/0/threaded
cret@cert.orghttp://www.securityfocus.com/bid/25037
cret@cert.orghttp://www.securityfocus.com/bid/26444
cret@cert.orghttp://www.securitytracker.com/id?1018442
cret@cert.orghttp://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.521385
cret@cert.orghttp://www.trusteer.com/docs/bind9dns.html
cret@cert.orghttp://www.trusteer.com/docs/bind9dns_s.html
cret@cert.orghttp://www.trustix.org/errata/2007/0023/
cret@cert.orghttp://www.ubuntu.com/usn/usn-491-1
cret@cert.orghttp://www.us-cert.gov/cas/techalerts/TA07-319A.htmlUS Government Resource
cret@cert.orghttp://www.vupen.com/english/advisories/2007/2627
cret@cert.orghttp://www.vupen.com/english/advisories/2007/2662
cret@cert.orghttp://www.vupen.com/english/advisories/2007/2782
cret@cert.orghttp://www.vupen.com/english/advisories/2007/2914
cret@cert.orghttp://www.vupen.com/english/advisories/2007/2932
cret@cert.orghttp://www.vupen.com/english/advisories/2007/3242
cret@cert.orghttp://www.vupen.com/english/advisories/2007/3868
cret@cert.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/35575
cret@cert.orghttps://issues.rpath.com/browse/RPL-1587
cret@cert.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10293
cret@cert.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2226
af854a3a-2127-422b-91ae-364da2661108ftp://aix.software.ibm.com/aix/efixes/security/README
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=307041
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01154600
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01174368
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=141879471518471&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=141879471518471&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26148
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26152Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26160
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26180
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26195
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26217
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26227
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26231
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26236
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26261
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26308
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26330
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26509
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26515
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26531
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26605
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26607
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26847
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26925
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27643
af854a3a-2127-422b-91ae-364da2661108http://security.freebsd.org/advisories/FreeBSD-SA-07:07.bind.asc
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-103018-1
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2007-389.htm
af854a3a-2127-422b-91ae-364da2661108http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=623903
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/search.wss?rs=0&q=IZ02218&apar=only
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/search.wss?rs=0&q=IZ02219&apar=only
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1341
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200708-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.isc.org/index.pl?/sw/bind/bind-security.php
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/252735US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:149
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_47_bind.html
af854a3a-2127-422b-91ae-364da2661108http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.022.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0740.html
af854a3a-2127-422b-91ae-364da2661108http://www.securiteam.com/securitynews/5VP0L0UM0A.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/474516/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/474545/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/474808/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/474856/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25037
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/26444
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018442
af854a3a-2127-422b-91ae-364da2661108http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.521385
af854a3a-2127-422b-91ae-364da2661108http://www.trusteer.com/docs/bind9dns.html
af854a3a-2127-422b-91ae-364da2661108http://www.trusteer.com/docs/bind9dns_s.html
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0023/
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-491-1
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-319A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2627
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2662
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2782
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2914
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2932
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3242
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3868
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/35575
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1587
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10293
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2226
Impacted products
Vendor Product Version
isc bind 9.0
isc bind 9.1
isc bind 9.2
isc bind 9.3
isc bind 9.4
isc bind 9.5
isc bind 9.5.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C52373DC-3E05-424B-9C78-4092A75C75A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1861756C-CC81-4EAB-8427-57A3C62BFF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F947835-8E96-4793-B81E-EEC103BF0CB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FA93166-513D-40AA-9855-FC89060BA03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C8B18D7-4D15-46A7-8013-E6267127A427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A944178-032B-4637-842D-BC6B227043A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CEF8AD-9EE7-4ADA-888E-883751962529",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning."
    },
    {
      "lang": "es",
      "value": "ISC BIND 9 hasta 9.5.0a5 utiliza un n\u00famero aleatorio debil a lo largo de la generaci\u00f3n de la consulta DNS ids cuando se responde la pregunta a resolver o enviando mensajes NOTIFY a servidores de nombre esclavos, lo cual hace m\u00e1s f\u00e1cil para atacantes remotos para adivinar la siguiente consulta id y llevar a cabo envenenamientos de la cache DNS."
    }
  ],
  "id": "CVE-2007-2926",
  "lastModified": "2024-11-21T00:31:59.083",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-07-24T17:30:00.000",
  "references": [
    {
      "source": "cret@cert.org",
      "url": "ftp://aix.software.ibm.com/aix/efixes/security/README"
    },
    {
      "source": "cret@cert.org",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc"
    },
    {
      "source": "cret@cert.org",
      "url": "http://docs.info.apple.com/article.html?artnum=307041"
    },
    {
      "source": "cret@cert.org",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426"
    },
    {
      "source": "cret@cert.org",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426"
    },
    {
      "source": "cret@cert.org",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01154600"
    },
    {
      "source": "cret@cert.org",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01174368"
    },
    {
      "source": "cret@cert.org",
      "url": "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
    },
    {
      "source": "cret@cert.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26148"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26152"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26160"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26180"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26195"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26217"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26227"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26231"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26236"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26261"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26308"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26330"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26509"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26515"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26531"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26605"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26607"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26847"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/26925"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/27643"
    },
    {
      "source": "cret@cert.org",
      "url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:07.bind.asc"
    },
    {
      "source": "cret@cert.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103018-1"
    },
    {
      "source": "cret@cert.org",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-389.htm"
    },
    {
      "source": "cret@cert.org",
      "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=623903"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IZ02218\u0026apar=only"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IZ02219\u0026apar=only"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.debian.org/security/2007/dsa-1341"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200708-13.xml"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/252735"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:149"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_47_bind.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.022.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0740.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securiteam.com/securitynews/5VP0L0UM0A.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/archive/1/474516/100/0/threaded"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/archive/1/474545/100/0/threaded"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/archive/1/474808/100/0/threaded"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/archive/1/474856/100/0/threaded"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/bid/25037"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/bid/26444"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securitytracker.com/id?1018442"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.521385"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.trusteer.com/docs/bind9dns.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.trusteer.com/docs/bind9dns_s.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.trustix.org/errata/2007/0023/"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.ubuntu.com/usn/usn-491-1"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-319A.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2007/2627"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2007/2662"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2007/2782"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2007/2914"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2007/2932"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2007/3242"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2007/3868"
    },
    {
      "source": "cret@cert.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35575"
    },
    {
      "source": "cret@cert.org",
      "url": "https://issues.rpath.com/browse/RPL-1587"
    },
    {
      "source": "cret@cert.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10293"
    },
    {
      "source": "cret@cert.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2226"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://aix.software.ibm.com/aix/efixes/security/README"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=307041"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01154600"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01174368"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26148"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26152"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26160"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26180"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26195"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26217"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26227"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26231"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26236"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26261"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26308"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26330"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26509"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26515"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26531"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26605"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26607"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26847"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26925"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27643"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:07.bind.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103018-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-389.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=623903"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IZ02218\u0026apar=only"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IZ02219\u0026apar=only"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1341"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200708-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/252735"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:149"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_47_bind.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0740.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securiteam.com/securitynews/5VP0L0UM0A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/474516/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/474545/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/474808/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/474856/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/25037"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/26444"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.521385"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trusteer.com/docs/bind9dns.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trusteer.com/docs/bind9dns_s.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2007/0023/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-491-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-319A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2627"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2662"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2782"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2914"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2932"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3242"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3868"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35575"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1587"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10293"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2226"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vendorComments": [
    {
      "comment": "Updates are available for Red Hat Enterprise Linux 2.1, 3, 4, and 5 to correct this issue:\nhttp://rhn.redhat.com/errata/RHSA-2007-0740.html",
      "lastModified": "2008-03-28T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.