BIND 4 and BIND 8, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods.
2002-12-31T05:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:P/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | isc | bind | 4.9 | Yes |
Application | isc | bind | 4.9.2 | Yes |
Application | isc | bind | 4.9.3 | Yes |
Application | isc | bind | 4.9.4 | Yes |
Application | isc | bind | 4.9.5 | Yes |
Application | isc | bind | 4.9.5 | Yes |
Application | isc | bind | 4.9.6 | Yes |
Application | isc | bind | 4.9.7 | Yes |
Application | isc | bind | 4.9.8 | Yes |
Application | isc | bind | 4.9.9 | Yes |
Application | isc | bind | 4.9.10 | Yes |
Application | isc | bind | 8.2 | Yes |
Application | isc | bind | 8.2.1 | Yes |
Application | isc | bind | 8.2.2 | Yes |
Application | isc | bind | 8.2.2 | Yes |
Application | isc | bind | 8.2.2 | Yes |
Application | isc | bind | 8.2.2 | Yes |
Application | isc | bind | 8.2.2 | Yes |
Application | isc | bind | 8.2.2 | Yes |
Application | isc | bind | 8.2.2 | Yes |
Application | isc | bind | 8.2.2 | Yes |
Application | isc | bind | 8.2.3 | Yes |
Application | isc | bind | 8.2.4 | Yes |
Application | isc | bind | 8.2.5 | Yes |
Application | isc | bind | 8.2.6 | Yes |
Application | isc | bind | 8.2.7 | Yes |
Application | isc | bind | 8.3.0 | Yes |
Application | isc | bind | 8.3.1 | Yes |
Application | isc | bind | 8.3.2 | Yes |
Application | isc | bind | 8.3.3 | Yes |
Application | isc | bind | 8.3.4 | Yes |