ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Bind | Isc | 9.0 (including) | 9.0 (including) |
Bind | Isc | 9.1 (including) | 9.1 (including) |
Bind | Isc | 9.2 (including) | 9.2 (including) |
Bind | Isc | 9.3 (including) | 9.3 (including) |
Bind | Isc | 9.4 (including) | 9.4 (including) |
Bind | Isc | 9.5 (including) | 9.5 (including) |
Bind | Isc | 9.5.0 (including) | 9.5.0 (including) |
Red Hat Enterprise Linux 2.1 | RedHat | bind-0:9.2.1-9.el2 | * |
Red Hat Enterprise Linux 3 | RedHat | bind-20:9.2.4-21.el3 | * |
Red Hat Enterprise Linux 4 | RedHat | bind-20:9.2.4-27.0.1.el4 | * |
Red Hat Enterprise Linux 5 | RedHat | bind-30:9.3.3-9.0.1.el5 | * |
Bind9 | Ubuntu | dapper | * |
Bind9 | Ubuntu | devel | * |
Bind9 | Ubuntu | edgy | * |
Bind9 | Ubuntu | feisty | * |