Rapid7 Vulnerability & Exploit Database

RHSA-2007:0740: bind security update

Back to Search

RHSA-2007:0740: bind security update

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
07/24/2007
Created
07/25/2018
Added
11/26/2007
Modified
07/04/2017

Description

Updated bind packages that fix a security issue are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

ISC BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. A flaw was found in the way BIND generates outbound DNS query ids. If an attacker is able to acquire a finite set of query IDs, it becomes possible to accurately predict future query IDs. Future query ID prediction may allow an attacker to conduct a DNS cache poisoning attack, which can result in the DNS server returning incorrect client query data. (CVE-2007-2926) Users of BIND are advised to upgrade to these updated packages, which contain backported patches to correct this issue.

Solution(s)

  • redhat-upgrade-bind
  • redhat-upgrade-bind-chroot
  • redhat-upgrade-bind-devel
  • redhat-upgrade-bind-libbind-devel
  • redhat-upgrade-bind-libs
  • redhat-upgrade-bind-sdb
  • redhat-upgrade-bind-utils
  • redhat-upgrade-caching-nameserver

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;