Lucene search

K
ubuntuUbuntuUSN-491-1
HistoryJul 25, 2007 - 12:00 a.m.

Bind vulnerability

2007-07-2500:00:00
ubuntu.com
27

6.7 Medium

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.111 Low

EPSS

Percentile

95.1%

Releases

  • Ubuntu 7.04
  • Ubuntu 6.10
  • Ubuntu 6.06

Details

A flaw was discovered in Bind’s sequence number generator. A remote
attacker could calculate future sequence numbers and send forged DNS
query responses. This could lead to client connections being directed
to attacker-controlled hosts, resulting in credential theft and other
attacks.

OSVersionArchitecturePackageVersionFilename
Ubuntu7.04noarchlibdns22< 1:9.3.4-2ubuntu2.1UNKNOWN
Ubuntu6.10noarchlibdns21< 1:9.3.2-2ubuntu3.2UNKNOWN
Ubuntu6.06noarchlibdns21< 1:9.3.2-2ubuntu1.3UNKNOWN

6.7 Medium

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.111 Low

EPSS

Percentile

95.1%