CVE-2007-2926

N/A Unknown
Published: July 24, 2007 Modified: April 23, 2026
View on NVD

Description

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/26152
Source: cret@cert.org
Vendor Advisory
http://www.kb.cert.org/vuls/id/252735
Source: cret@cert.org
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA07-319A.html
Source: cret@cert.org
US Government Resource
ftp://aix.software.ibm.com/aix/efixes/security/README
Source: af854a3a-2127-422b-91ae-364da2661108
http://docs.info.apple.com/article.html?artnum=307041
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=141879471518471&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26148
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26152
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26160
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26180
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26195
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26217
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26227
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26231
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26236
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26261
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26308
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26330
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26509
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26515
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26531
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26605
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26607
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26847
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26925
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/27643
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.freebsd.org/advisories/FreeBSD-SA-07:07.bind.asc
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103018-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2007-389.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=623903
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-1.ibm.com/support/search.wss?rs=0&q=IZ02218&apar=only
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-1.ibm.com/support/search.wss?rs=0&q=IZ02219&apar=only
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2007/dsa-1341
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200708-13.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.isc.org/index.pl?/sw/bind/bind-security.php
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/252735
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2007:149
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2007_47_bind.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0740.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securiteam.com/securitynews/5VP0L0UM0A.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/474516/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/474545/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/474808/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/474856/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/25037
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/26444
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1018442
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.trusteer.com/docs/bind9dns.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.trusteer.com/docs/bind9dns_s.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.trustix.org/errata/2007/0023/
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-491-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA07-319A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2007/2627
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/2662
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/2782
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/2914
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/2932
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/3242
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/3868
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/35575
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-1587
Source: af854a3a-2127-422b-91ae-364da2661108

134 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
20.6%
96th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

isc