ISC BIND 8 Remote Cache Poisoning Vulnerability
BID:25459
Info
ISC BIND 8 Remote Cache Poisoning Vulnerability
| Bugtraq ID: | 25459 |
| Class: | Design Error |
| CVE: |
CVE-2007-2930 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 27 2007 12:00AM |
| Updated: | May 05 2008 11:26PM |
| Credit: | Amit Klein discovered this vulnerability. |
| Vulnerable: |
Sun Solaris 9_x86 Sun Solaris 9 Sun Solaris 8_x86 Sun Solaris 8_sparc Nortel Networks Self-Service Speech Server 0 Nortel Networks Self-Service Peri Application 0 Nortel Networks Self-Service MPS 500 0 Nortel Networks Self-Service MPS 1000 0 Nortel Networks Self-Service MPS 100 0 Nortel Networks Self-Service - CCSS7 0 Nortel Networks Enterprise NMS 0 Nortel Networks Business Communications Manager 3.0 Nortel Networks Business Communications Manager 2.0 Nortel Networks BCM 400 Nortel Networks BCM 200 Nortel Networks BCM 1000 ISC BIND 8.4.7 ISC BIND 8.4.6 ISC BIND 8.4.5 ISC BIND 8.4.4 ISC BIND 8.4.3 ISC BIND 8.4.2 ISC BIND 8.4.1 ISC BIND 8.4 ISC BIND 8.3.7 ISC BIND 8.3.6 ISC BIND 8.3.5 ISC BIND 8.3.4 ISC BIND 8.3.3 ISC BIND 8.3.2 ISC BIND 8.3.1 ISC BIND 8.3 .0 ISC BIND 8.2.7 ISC BIND 8.2.6 ISC BIND 8.2.5 ISC BIND 8.2.4 ISC BIND 8.2.3 Beta ISC BIND 8.2.3 ISC BIND 8.2.2 p7 ISC BIND 8.2.2 p6 ISC BIND 8.2.2 p5 ISC BIND 8.2.2 p4 ISC BIND 8.2.2 p3 ISC BIND 8.2.2 p2 ISC BIND 8.2.2 p1 ISC BIND 8.2.2 ISC BIND 8.2.1 ISC BIND 8.2 IBM AIX 5.3 IBM AIX 5.2 HP HP-UX B.11.11 Avaya Proactive Contact 0 Avaya Predictive Dialer (PDS) APC 3.0 Avaya Predictive Dialer 0 Avaya Interactive Response 1.3 Avaya Interactive Response 1.2.1 Avaya Interactive Response 3.0 Avaya Interactive Response 2.0 Avaya Interactive Response Avaya CMS Supervisor 0 Avaya CMS Server 13.0 Avaya CMS Server 12.0 Avaya CMS Server 11.0 Avaya CMS Server 10.0 Avaya CMS Server 9.0 Avaya CMS Server 8.0 Avaya CMS Server 14.0 Avaya CMS Server 13.1 |
| Not Vulnerable: |
Nortel Networks SRG200/400 1.5 Nortel Networks Business Communications Manager 4.0 ISC BIND 8.4.7 -P1 |
Discussion
ISC BIND 8 Remote Cache Poisoning Vulnerability
BIND 8 is prone to a remote cache-poisoning vulnerability because of weaknesses in its random-number generator.
An attacker may leverage this issue to manipulate cache data, potentially facilitating man-in-the-middle, site-impersonation, or denial-of-service attacks.
Versions of BIND from 8.2.0 through to 8.4.7 are vulnerable to this issue.
BIND 8 is prone to a remote cache-poisoning vulnerability because of weaknesses in its random-number generator.
An attacker may leverage this issue to manipulate cache data, potentially facilitating man-in-the-middle, site-impersonation, or denial-of-service attacks.
Versions of BIND from 8.2.0 through to 8.4.7 are vulnerable to this issue.
Exploit / POC
ISC BIND 8 Remote Cache Poisoning Vulnerability
The following exploit code is available:
The following exploit code is available:
Solution / Fix
ISC BIND 8 Remote Cache Poisoning Vulnerability
Solution:
The vendor has released BIND 8.4.7-P1 to address this issue. Please see the references for more information.
Sun Solaris 8_sparc
IBM AIX 5.2
IBM AIX 5.3
Sun Solaris 9
Sun Solaris 9_x86
Sun Solaris 8_x86
ISC BIND 8.2
ISC BIND 8.2.1
ISC BIND 8.2.2 p3
ISC BIND 8.2.2 p6
ISC BIND 8.2.2 p4
ISC BIND 8.2.2 p5
ISC BIND 8.2.2 p7
ISC BIND 8.2.2
ISC BIND 8.2.2 p2
ISC BIND 8.2.2 p1
ISC BIND 8.2.3
ISC BIND 8.2.3 Beta
ISC BIND 8.2.4
ISC BIND 8.2.5
ISC BIND 8.2.6
ISC BIND 8.2.7
ISC BIND 8.3 .0
ISC BIND 8.3.1
ISC BIND 8.3.2
ISC BIND 8.3.3
ISC BIND 8.3.4
ISC BIND 8.3.5
ISC BIND 8.3.6
ISC BIND 8.3.7
ISC BIND 8.4
ISC BIND 8.4.1
ISC BIND 8.4.2
ISC BIND 8.4.3
ISC BIND 8.4.4
ISC BIND 8.4.5
ISC BIND 8.4.6
ISC BIND 8.4.7
Solution:
The vendor has released BIND 8.4.7-P1 to address this issue. Please see the references for more information.
Sun Solaris 8_sparc
IBM AIX 5.2
-
IBM bind8_ifix.tar
ftp://aix.software.ibm.com/aix/efixes/security/bind8_ifix.tar
IBM AIX 5.3
-
IBM bind8_ifix.tar
ftp://aix.software.ibm.com/aix/efixes/security/bind8_ifix.tar
Sun Solaris 9
Sun Solaris 9_x86
Sun Solaris 8_x86
ISC BIND 8.2
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.2.1
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.2.2 p3
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.2.2 p6
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.2.2 p4
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.2.2 p5
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.2.2 p7
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.2.2
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.2.2 p2
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.2.2 p1
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.2.3
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.2.3 Beta
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.2.4
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.2.5
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.2.6
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.2.7
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.3 .0
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.3.1
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.3.2
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.3.3
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.3.4
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.3.5
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.3.6
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.3.7
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.4
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.4.1
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.4.2
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.4.3
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.4.4
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.4.5
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.4.6
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
ISC BIND 8.4.7
-
ISC BIND 8.4.7-P1
ftp://ftp.isc.org/isc/bind8/src/8.4.7-P1/
References
ISC BIND 8 Remote Cache Poisoning Vulnerability
References:
References:
- BIND 8 End Of Life Announcement (ISC)
- ISC BIND Homepage (ISC)
- BIND 8 EOL and BIND 8 DNS Cache Poisoning (Amit Klein, Trusteer) ("Amit Klein"
) - ASA-2007-448 Security Vulnerability in BIND 8 May Allow Cache Poisoning Attack ( (Avaya)
- ASA-2008-022 HP-UX Running BIND 8, Remote DNS Cache Poisoning (HPSBUX02289) (Avaya)
- BIND 8 DNS Cache Poisoning (Amit Klein)
- Nortel Networks Security Advisory 2008008807 (Nortel Networks)
- Nortel Response to Potential Vunerability VU#927905 - BIND 8 May Allow Cache Poi (Nortel Networks)
- Sun Alert ID: 103063: Security Vulnerability in BIND 8 May Allow Cache Poisoning (Sun Microsystems)
- Vulnerability Note VU#927905 BIND version 8 generates cryptographically weak DNS (US-CERT)