6.8 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.101 Low
EPSS
Percentile
94.8%
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1,
9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and
SP3, and Server 2003 SP1 and SP2; and other implementations allow remote
attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick
referrals to conduct cache poisoning against recursive resolvers, related
to insufficient randomness of DNS transaction IDs and source ports, aka
“DNS Insufficient Socket Entropy Vulnerability” or “the Kaminsky bug.”
Author | Note |
---|---|
mdeslaur | from debian: “glibc stub resolver relies on source port randomisation in kernel” |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 6.06 | noarch | bind9 | < 1:9.3.2-2ubuntu1.5 | UNKNOWN |
ubuntu | 7.04 | noarch | bind9 | < 1:9.3.4-2ubuntu2.3 | UNKNOWN |
ubuntu | 7.10 | noarch | bind9 | < 1:9.4.1-P1-3ubuntu2 | UNKNOWN |
ubuntu | 8.04 | noarch | bind9 | < 1:9.4.2-10ubuntu0.1 | UNKNOWN |
ubuntu | 8.10 | noarch | bind9 | < 1:9.5.0.dfsg.P1-2~build1 | UNKNOWN |
ubuntu | 9.04 | noarch | bind9 | < 1:9.5.0.dfsg.P1-2~build1 | UNKNOWN |
ubuntu | 9.10 | noarch | bind9 | < 1:9.5.0.dfsg.P1-2~build1 | UNKNOWN |
ubuntu | 8.04 | noarch | dnsmasq | < 2.41-2ubuntu2.1 | UNKNOWN |
ubuntu | 8.10 | noarch | dnsmasq | < 2.43-1ubuntu1 | UNKNOWN |
ubuntu | 9.04 | noarch | dnsmasq | < 2.43-1ubuntu1 | UNKNOWN |
6.8 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.101 Low
EPSS
Percentile
94.8%