The DNS resolver in unspecified versions of Infoblox DNS One, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Bind | Isc | 8.2.2 | 8.2.2 |
Bind | Isc | 8.2 | 8.2 |
Bind | Isc | 4.9.5 | 4.9.5 |
Bind | Isc | 4.9.4 | 4.9.4 |
Bind | Isc | 8.2.1 | 8.2.1 |
Bind | Isc | 8.2.2 | 8.2.2 |
Bind | Isc | 8.2.5 | 8.2.5 |
Bind | Isc | 8.3.1 | 8.3.1 |
Bind | Isc | 8.3.2 | 8.3.2 |
Bind | Isc | 8.2.2 | 8.2.2 |
Dns_one | Infoblox | * | * |
Bind | Isc | 4.9.8 | 4.9.8 |
Bind | Isc | 8.2.2 | 8.2.2 |
Bind | Isc | 8.3.4 | 8.3.4 |
Bind | Isc | 4.9.6 | 4.9.6 |
Bind | Isc | 8.2.7 | 8.2.7 |
Bind | Isc | 8.2.2 | 8.2.2 |
Bind | Isc | 8.2.4 | 8.2.4 |
Bind | Isc | 8.2.2 | 8.2.2 |
Bind | Isc | 4.9.10 | 4.9.10 |
Bind | Isc | 4.9 | 4.9 |
Bind | Isc | 8.2.6 | 8.2.6 |
Bind | Isc | 4.9.3 | 4.9.3 |
Bind | Isc | 4.9.7 | 4.9.7 |
Bind | Isc | 8.2.2 | 8.2.2 |
Bind | Isc | 8.3.0 | 8.3.0 |
Bind | Isc | 8.2.2 | 8.2.2 |
Bind | Isc | 8.3.3 | 8.3.3 |
Bind | Isc | 4.9.9 | 4.9.9 |
Bind | Isc | 4.9.5 | 4.9.5 |
Bind | Isc | 4.9.2 | 4.9.2 |
Bind | Isc | 8.2.3 | 8.2.3 |