search menu icon-carat-right cmu-wordmark

CERT Coordination Center

ISC BIND generates cryptographically weak DNS query IDs

Vulnerability Note VU#252735

Original Release Date: 2007-07-27 | Last Revised: 2008-08-06

Overview

ISC (Internet Systems Consortiuim) BIND generates cryptographically weak DNS query IDs which could allow a remote attacker to poison DNS caches.

Description

From the ISC Bind security page:

The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker.

This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers.

All users are encouraged to upgrade.

Impact

A remote attacker could predict DNS query IDs and respond with arbitrary answers, thus poisoning DNS caches.

Solution

Upgrade or Patch


This issue is addressed in ISC BIND 9.2.8-P1, BIND 9.3.4-P1, BIND 9.4.1-P1 or BIND 9.5.0a6. Users who obtain BIND from their operating system vendor should see the systems affected portion of this document for a partial list of affected vendors.

Vendor Information

252735
 

View all 41 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by ISC who credit Amit Klein from Trusteer.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2007-2926
Severity Metric: 3.83
Date Public: 2007-07-24
Date First Published: 2007-07-27
Date Last Updated: 2008-08-06 13:02 UTC
Document Revision: 27

Sponsored by CISA.