Vulnerability Details : CVE-2007-2926
ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.
Threat overview for CVE-2007-2926
Top countries where our scanners detected CVE-2007-2926
Top open port discovered on systems with this issue
53
IPs affected by CVE-2007-2926 268
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2007-2926!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2007-2926
Probability of exploitation activity in the next 30 days: 9.72%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 95 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-2926
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
Vendor statements for CVE-2007-2926
-
Red Hat 2008-03-28Updates are available for Red Hat Enterprise Linux 2.1, 3, 4, and 5 to correct this issue: http://rhn.redhat.com/errata/RHSA-2007-0740.html
-
http://security.freebsd.org/advisories/FreeBSD-SA-07:07.bind.asc
-
http://www.us-cert.gov/cas/techalerts/TA07-319A.html
Page Not Found | CISAUS Government Resource
-
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01154600
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10293
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103018-1
-
http://www.vupen.com/english/advisories/2007/2932
-
http://www.trustix.org/errata/2007/0023/
Trustix | Empowering Trust and Security in the Digital Age
-
http://www.vupen.com/english/advisories/2007/2782
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:149
-
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01174368
-
http://www.securiteam.com/securitynews/5VP0L0UM0A.html
-
http://www.kb.cert.org/vuls/id/252735
US Government Resource
- http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.022.html
-
http://www.securityfocus.com/archive/1/474545/100/0/threaded
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2226
-
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426
-
http://www.debian.org/security/2007/dsa-1341
-
http://www.vupen.com/english/advisories/2007/2662
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/35575
-
http://www.ubuntu.com/usn/usn-491-1
-
http://www.trusteer.com/docs/bind9dns.html
- ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc
-
http://www.vupen.com/english/advisories/2007/3868
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
- http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=623903
-
http://www.securityfocus.com/bid/25037
-
http://www.vupen.com/english/advisories/2007/2627
-
http://www-1.ibm.com/support/search.wss?rs=0&q=IZ02218&apar=only
-
http://www.securityfocus.com/archive/1/474516/100/0/threaded
-
https://issues.rpath.com/browse/RPL-1587
- http://www.securityfocus.com/bid/26444
-
http://www.redhat.com/support/errata/RHSA-2007-0740.html
-
http://marc.info/?l=bugtraq&m=141879471518471&w=2
'[security bulletin] HPSBOV03226 rev.1 - HP TCP/IP Services for OpenVMS, BIND 9 Resolver, Multiple Re' - MARC
-
http://www.securityfocus.com/archive/1/474856/100/0/threaded
- http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.521385
- http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html
- http://www.vupen.com/english/advisories/2007/2914
-
http://www.trusteer.com/docs/bind9dns_s.html
-
http://www.securityfocus.com/archive/1/474808/100/0/threaded
-
http://www-1.ibm.com/support/search.wss?rs=0&q=IZ02219&apar=only
- http://www.isc.org/index.pl?/sw/bind/bind-security.php
- http://www.gentoo.org/security/en/glsa/glsa-200708-13.xml
-
http://support.avaya.com/elmodocs2/security/ASA-2007-389.htm
-
http://www.vupen.com/english/advisories/2007/3242
-
http://www.novell.com/linux/security/advisories/2007_47_bind.html
- ftp://aix.software.ibm.com/aix/efixes/security/README
- http://docs.info.apple.com/article.html?artnum=307041
-
http://www.securitytracker.com/id?1018442
- cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*