{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2007-07-24T00:00:00.000Z","descriptions":[{"lang":"en","value":"ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-16T14:57:01.000Z","orgId":"37e5125f-f79b-445b-8fad-9564f167944b","shortName":"certcc"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-389.htm"},{"tags":["x_refsource_MISC"],"url":"http://www.trusteer.com/docs/bind9dns_s.html"},{"name":"26231","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26231"},{"name":"ADV-2007-2932","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/2932"},{"name":"HPSBOV03226","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2"},{"name":"26847","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26847"},{"name":"IZ02218","tags":["vendor-advisory","x_refsource_AIXAPAR"],"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IZ02218&apar=only"},{"name":"ADV-2007-2914","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/2914"},{"name":"RHSA-2007:0740","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0740.html"},{"name":"26217","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26217"},{"name":"SSRT101004","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2"},{"name":"26509","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26509"},{"name":"HPSBOV02261","tags":["vendor-advisory","x_refsource_HP"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01174368"},{"name":"26444","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/26444"},{"tags":["x_refsource_MISC"],"url":"http://www.securiteam.com/securitynews/5VP0L0UM0A.html"},{"name":"HPSBUX02251","tags":["vendor-advisory","x_refsource_HP"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426"},{"name":"26605","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26605"},{"name":"103018","tags":["vendor-advisory","x_refsource_SUNALERT"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103018-1"},{"name":"MDKSA-2007:149","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:149"},{"name":"26607","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26607"},{"name":"20070727 Re: \"BIND 9 DNS Cache Poisoning\" by Amit Klein (Trusteer)","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/474856/100/0/threaded"},{"name":"26148","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26148"},{"name":"FreeBSD-SA-07:07","tags":["vendor-advisory","x_refsource_FREEBSD"],"url":"http://security.freebsd.org/advisories/FreeBSD-SA-07:07.bind.asc"},{"name":"VU#252735","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/252735"},{"tags":["x_refsource_MISC"],"url":"http://www.trusteer.com/docs/bind9dns.html"},{"name":"26180","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26180"},{"name":"GLSA-200708-13","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200708-13.xml"},{"name":"26152","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26152"},{"name":"2007-0023","tags":["vendor-advisory","x_refsource_TRUSTIX"],"url":"http://www.trustix.org/errata/2007/0023/"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=623903"},{"name":"SSA:2007-207-01","tags":["vendor-advisory","x_refsource_SLACKWARE"],"url":"http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.521385"},{"name":"APPLE-SA-2007-11-14","tags":["vendor-advisory","x_refsource_APPLE"],"url":"http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://docs.info.apple.com/article.html?artnum=307041"},{"name":"20070724 \"BIND 9 DNS Cache Poisoning\" by Amit Klein (Trusteer)","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/474516/100/0/threaded"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.isc.org/index.pl?/sw/bind/bind-security.php"},{"name":"IZ02219","tags":["vendor-advisory","x_refsource_AIXAPAR"],"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IZ02219&apar=only"},{"name":"isc-bind-queryid-spoofing(35575)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35575"},{"name":"ADV-2007-2782","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/2782"},{"name":"26227","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26227"},{"name":"26261","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26261"},{"name":"ADV-2007-3868","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/3868"},{"name":"25037","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/25037"},{"name":"26515","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26515"},{"name":"USN-491-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/usn-491-1"},{"name":"26330","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26330"},{"tags":["x_refsource_CONFIRM"],"url":"https://issues.rpath.com/browse/RPL-1587"},{"name":"HPSBTU02256","tags":["vendor-advisory","x_refsource_HP"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01154600"},{"name":"1018442","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1018442"},{"name":"20070801-01-P","tags":["vendor-advisory","x_refsource_SGI"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc"},{"name":"DSA-1341","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2007/dsa-1341"},{"name":"26308","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26308"},{"name":"SUSE-SA:2007:047","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2007_47_bind.html"},{"name":"ADV-2007-2627","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/2627"},{"name":"oval:org.mitre.oval:def:2226","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2226"},{"name":"27643","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27643"},{"name":"26236","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26236"},{"name":"ADV-2007-2662","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/2662"},{"name":"26195","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26195"},{"tags":["x_refsource_CONFIRM"],"url":"ftp://aix.software.ibm.com/aix/efixes/security/README"},{"name":"ADV-2007-3242","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/3242"},{"name":"oval:org.mitre.oval:def:10293","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10293"},{"name":"OpenPKG-SA-2007.022","tags":["vendor-advisory","x_refsource_OPENPKG"],"url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.022.html"},{"name":"TA07-319A","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.us-cert.gov/cas/techalerts/TA07-319A.html"},{"name":"26925","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26925"},{"name":"26160","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26160"},{"name":"20070724 Re: \"BIND 9 DNS Cache Poisoning\" by Amit Klein (Trusteer)","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/474545/100/0/threaded"},{"name":"SSRT071449","tags":["vendor-advisory","x_refsource_HP"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426"},{"name":"20070726 Re: \"BIND 9 DNS Cache Poisoning\" by Amit Klein (Trusteer)","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/474808/100/0/threaded"},{"name":"26531","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26531"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cert@cert.org","ID":"CVE-2007-2926","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://support.avaya.com/elmodocs2/security/ASA-2007-389.htm","refsource":"CONFIRM","url":"http://support.avaya.com/elmodocs2/security/ASA-2007-389.htm"},{"name":"http://www.trusteer.com/docs/bind9dns_s.html","refsource":"MISC","url":"http://www.trusteer.com/docs/bind9dns_s.html"},{"name":"26231","refsource":"SECUNIA","url":"http://secunia.com/advisories/26231"},{"name":"ADV-2007-2932","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/2932"},{"name":"HPSBOV03226","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2"},{"name":"26847","refsource":"SECUNIA","url":"http://secunia.com/advisories/26847"},{"name":"IZ02218","refsource":"AIXAPAR","url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IZ02218&apar=only"},{"name":"ADV-2007-2914","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/2914"},{"name":"RHSA-2007:0740","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2007-0740.html"},{"name":"26217","refsource":"SECUNIA","url":"http://secunia.com/advisories/26217"},{"name":"SSRT101004","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2"},{"name":"26509","refsource":"SECUNIA","url":"http://secunia.com/advisories/26509"},{"name":"HPSBOV02261","refsource":"HP","url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01174368"},{"name":"26444","refsource":"BID","url":"http://www.securityfocus.com/bid/26444"},{"name":"http://www.securiteam.com/securitynews/5VP0L0UM0A.html","refsource":"MISC","url":"http://www.securiteam.com/securitynews/5VP0L0UM0A.html"},{"name":"HPSBUX02251","refsource":"HP","url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426"},{"name":"26605","refsource":"SECUNIA","url":"http://secunia.com/advisories/26605"},{"name":"103018","refsource":"SUNALERT","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103018-1"},{"name":"MDKSA-2007:149","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:149"},{"name":"26607","refsource":"SECUNIA","url":"http://secunia.com/advisories/26607"},{"name":"20070727 Re: \"BIND 9 DNS Cache Poisoning\" by Amit Klein (Trusteer)","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/474856/100/0/threaded"},{"name":"26148","refsource":"SECUNIA","url":"http://secunia.com/advisories/26148"},{"name":"FreeBSD-SA-07:07","refsource":"FREEBSD","url":"http://security.freebsd.org/advisories/FreeBSD-SA-07:07.bind.asc"},{"name":"VU#252735","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/252735"},{"name":"http://www.trusteer.com/docs/bind9dns.html","refsource":"MISC","url":"http://www.trusteer.com/docs/bind9dns.html"},{"name":"26180","refsource":"SECUNIA","url":"http://secunia.com/advisories/26180"},{"name":"GLSA-200708-13","refsource":"GENTOO","url":"http://www.gentoo.org/security/en/glsa/glsa-200708-13.xml"},{"name":"26152","refsource":"SECUNIA","url":"http://secunia.com/advisories/26152"},{"name":"2007-0023","refsource":"TRUSTIX","url":"http://www.trustix.org/errata/2007/0023/"},{"name":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=623903","refsource":"CONFIRM","url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=623903"},{"name":"SSA:2007-207-01","refsource":"SLACKWARE","url":"http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.521385"},{"name":"APPLE-SA-2007-11-14","refsource":"APPLE","url":"http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html"},{"name":"http://docs.info.apple.com/article.html?artnum=307041","refsource":"CONFIRM","url":"http://docs.info.apple.com/article.html?artnum=307041"},{"name":"20070724 \"BIND 9 DNS Cache Poisoning\" by Amit Klein (Trusteer)","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/474516/100/0/threaded"},{"name":"http://www.isc.org/index.pl?/sw/bind/bind-security.php","refsource":"CONFIRM","url":"http://www.isc.org/index.pl?/sw/bind/bind-security.php"},{"name":"IZ02219","refsource":"AIXAPAR","url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IZ02219&apar=only"},{"name":"isc-bind-queryid-spoofing(35575)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35575"},{"name":"ADV-2007-2782","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/2782"},{"name":"26227","refsource":"SECUNIA","url":"http://secunia.com/advisories/26227"},{"name":"26261","refsource":"SECUNIA","url":"http://secunia.com/advisories/26261"},{"name":"ADV-2007-3868","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/3868"},{"name":"25037","refsource":"BID","url":"http://www.securityfocus.com/bid/25037"},{"name":"26515","refsource":"SECUNIA","url":"http://secunia.com/advisories/26515"},{"name":"USN-491-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/usn-491-1"},{"name":"26330","refsource":"SECUNIA","url":"http://secunia.com/advisories/26330"},{"name":"https://issues.rpath.com/browse/RPL-1587","refsource":"CONFIRM","url":"https://issues.rpath.com/browse/RPL-1587"},{"name":"HPSBTU02256","refsource":"HP","url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01154600"},{"name":"1018442","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1018442"},{"name":"20070801-01-P","refsource":"SGI","url":"ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc"},{"name":"DSA-1341","refsource":"DEBIAN","url":"http://www.debian.org/security/2007/dsa-1341"},{"name":"26308","refsource":"SECUNIA","url":"http://secunia.com/advisories/26308"},{"name":"SUSE-SA:2007:047","refsource":"SUSE","url":"http://www.novell.com/linux/security/advisories/2007_47_bind.html"},{"name":"ADV-2007-2627","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/2627"},{"name":"oval:org.mitre.oval:def:2226","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2226"},{"name":"27643","refsource":"SECUNIA","url":"http://secunia.com/advisories/27643"},{"name":"26236","refsource":"SECUNIA","url":"http://secunia.com/advisories/26236"},{"name":"ADV-2007-2662","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/2662"},{"name":"26195","refsource":"SECUNIA","url":"http://secunia.com/advisories/26195"},{"name":"ftp://aix.software.ibm.com/aix/efixes/security/README","refsource":"CONFIRM","url":"ftp://aix.software.ibm.com/aix/efixes/security/README"},{"name":"ADV-2007-3242","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/3242"},{"name":"oval:org.mitre.oval:def:10293","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10293"},{"name":"OpenPKG-SA-2007.022","refsource":"OPENPKG","url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.022.html"},{"name":"TA07-319A","refsource":"CERT","url":"http://www.us-cert.gov/cas/techalerts/TA07-319A.html"},{"name":"26925","refsource":"SECUNIA","url":"http://secunia.com/advisories/26925"},{"name":"26160","refsource":"SECUNIA","url":"http://secunia.com/advisories/26160"},{"name":"20070724 Re: \"BIND 9 DNS Cache Poisoning\" by Amit Klein (Trusteer)","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/474545/100/0/threaded"},{"name":"SSRT071449","refsource":"HP","url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426"},{"name":"20070726 Re: \"BIND 9 DNS Cache Poisoning\" by Amit Klein (Trusteer)","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/474808/100/0/threaded"},{"name":"26531","refsource":"SECUNIA","url":"http://secunia.com/advisories/26531"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T13:57:54.738Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-389.htm"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.trusteer.com/docs/bind9dns_s.html"},{"name":"26231","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26231"},{"name":"ADV-2007-2932","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/2932"},{"name":"HPSBOV03226","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2"},{"name":"26847","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26847"},{"name":"IZ02218","tags":["vendor-advisory","x_refsource_AIXAPAR","x_transferred"],"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IZ02218&apar=only"},{"name":"ADV-2007-2914","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/2914"},{"name":"RHSA-2007:0740","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0740.html"},{"name":"26217","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26217"},{"name":"SSRT101004","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2"},{"name":"26509","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26509"},{"name":"HPSBOV02261","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01174368"},{"name":"26444","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/26444"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.securiteam.com/securitynews/5VP0L0UM0A.html"},{"name":"HPSBUX02251","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426"},{"name":"26605","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26605"},{"name":"103018","tags":["vendor-advisory","x_refsource_SUNALERT","x_transferred"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103018-1"},{"name":"MDKSA-2007:149","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:149"},{"name":"26607","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26607"},{"name":"20070727 Re: \"BIND 9 DNS Cache Poisoning\" by Amit Klein (Trusteer)","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/474856/100/0/threaded"},{"name":"26148","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26148"},{"name":"FreeBSD-SA-07:07","tags":["vendor-advisory","x_refsource_FREEBSD","x_transferred"],"url":"http://security.freebsd.org/advisories/FreeBSD-SA-07:07.bind.asc"},{"name":"VU#252735","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/252735"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.trusteer.com/docs/bind9dns.html"},{"name":"26180","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26180"},{"name":"GLSA-200708-13","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200708-13.xml"},{"name":"26152","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26152"},{"name":"2007-0023","tags":["vendor-advisory","x_refsource_TRUSTIX","x_transferred"],"url":"http://www.trustix.org/errata/2007/0023/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=623903"},{"name":"SSA:2007-207-01","tags":["vendor-advisory","x_refsource_SLACKWARE","x_transferred"],"url":"http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.521385"},{"name":"APPLE-SA-2007-11-14","tags":["vendor-advisory","x_refsource_APPLE","x_transferred"],"url":"http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://docs.info.apple.com/article.html?artnum=307041"},{"name":"20070724 \"BIND 9 DNS Cache Poisoning\" by Amit Klein (Trusteer)","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/474516/100/0/threaded"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.isc.org/index.pl?/sw/bind/bind-security.php"},{"name":"IZ02219","tags":["vendor-advisory","x_refsource_AIXAPAR","x_transferred"],"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IZ02219&apar=only"},{"name":"isc-bind-queryid-spoofing(35575)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35575"},{"name":"ADV-2007-2782","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/2782"},{"name":"26227","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26227"},{"name":"26261","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26261"},{"name":"ADV-2007-3868","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/3868"},{"name":"25037","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/25037"},{"name":"26515","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26515"},{"name":"USN-491-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/usn-491-1"},{"name":"26330","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26330"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://issues.rpath.com/browse/RPL-1587"},{"name":"HPSBTU02256","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01154600"},{"name":"1018442","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1018442"},{"name":"20070801-01-P","tags":["vendor-advisory","x_refsource_SGI","x_transferred"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc"},{"name":"DSA-1341","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2007/dsa-1341"},{"name":"26308","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26308"},{"name":"SUSE-SA:2007:047","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2007_47_bind.html"},{"name":"ADV-2007-2627","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/2627"},{"name":"oval:org.mitre.oval:def:2226","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2226"},{"name":"27643","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27643"},{"name":"26236","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26236"},{"name":"ADV-2007-2662","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/2662"},{"name":"26195","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26195"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"ftp://aix.software.ibm.com/aix/efixes/security/README"},{"name":"ADV-2007-3242","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/3242"},{"name":"oval:org.mitre.oval:def:10293","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10293"},{"name":"OpenPKG-SA-2007.022","tags":["vendor-advisory","x_refsource_OPENPKG","x_transferred"],"url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.022.html"},{"name":"TA07-319A","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.us-cert.gov/cas/techalerts/TA07-319A.html"},{"name":"26925","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26925"},{"name":"26160","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26160"},{"name":"20070724 Re: \"BIND 9 DNS Cache Poisoning\" by Amit Klein (Trusteer)","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/474545/100/0/threaded"},{"name":"SSRT071449","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426"},{"name":"20070726 Re: \"BIND 9 DNS Cache Poisoning\" by Amit Klein (Trusteer)","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/474808/100/0/threaded"},{"name":"26531","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26531"}]}]},"cveMetadata":{"assignerOrgId":"37e5125f-f79b-445b-8fad-9564f167944b","assignerShortName":"certcc","cveId":"CVE-2007-2926","datePublished":"2007-07-24T17:00:00.000Z","dateReserved":"2007-05-30T00:00:00.000Z","dateUpdated":"2024-08-07T13:57:54.738Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}