Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2007:0740

The remote host is missing updates announced in
advisory RHSA-2007:0740.

ISC BIND (Berkeley Internet Name Domain) is an implementation of the DNS
(Domain Name System) protocols.

A flaw was found in the way BIND generates outbound DNS query ids. If an
attacker is able to acquire a finite set of query IDs, it becomes possible
to accurately predict future query IDs. Future query ID prediction may
allow an attacker to conduct a DNS cache poisoning attack, which can result
in the DNS server returning incorrect client query data. (CVE-2007-2926)

Users of BIND are advised to upgrade to these updated packages, which
contain backported patches to correct this issue.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

Risk factor : Medium

CVSS Score:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-2926
BugTraq ID: 25037
BugTraq ID: 26444
Bugtraq: 20070724 "BIND 9 DNS Cache Poisoning" by Amit Klein (Trusteer) (Google Search)
Bugtraq: 20070727 Re: "BIND 9 DNS Cache Poisoning" by Amit Klein (Trusteer) (Google Search)
Cert/CC Advisory: TA07-319A
CERT/CC vulnerability note: VU#252735
Debian Security Information: DSA-1341 (Google Search)
FreeBSD Security Advisory: FreeBSD-SA-07:07
HPdes Security Advisory: HPSBOV02261
HPdes Security Advisory: HPSBOV03226
HPdes Security Advisory: HPSBTU02256
HPdes Security Advisory: HPSBUX02251
HPdes Security Advisory: SSRT071449
HPdes Security Advisory: SSRT101004
SGI Security Advisory: 20070801-01-P
SuSE Security Announcement: SUSE-SA:2007:047 (Google Search)
XForce ISS Database: isc-bind-queryid-spoofing(35575)
CopyrightCopyright (c) 2007 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.