4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.111 Low
EPSS
Percentile
95.1%
CentOS Errata and Security Advisory CESA-2007:0740-01
ISC BIND (Berkeley Internet Name Domain) is an implementation of the DNS
(Domain Name System) protocols.
A flaw was found in the way BIND generates outbound DNS query ids. If an
attacker is able to acquire a finite set of query IDs, it becomes possible
to accurately predict future query IDs. Future query ID prediction may
allow an attacker to conduct a DNS cache poisoning attack, which can result
in the DNS server returning incorrect client query data. (CVE-2007-2926)
Users of BIND are advised to upgrade to these updated packages, which
contain backported patches to correct this issue.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2007-July/076239.html
Affected packages:
bind
bind-devel
bind-utils
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 2 | i386 | bind | < 9.2.1-9.el2 | bind-9.2.1-9.el2.i386.rpm |
CentOS | 2 | i386 | bind-devel | < 9.2.1-9.el2 | bind-devel-9.2.1-9.el2.i386.rpm |
CentOS | 2 | i386 | bind-utils | < 9.2.1-9.el2 | bind-utils-9.2.1-9.el2.i386.rpm |