bind
Page content
- Author: vmiklos
- Vulnerable: 9.4.1-1terminus2
- Unaffected: 9.4.1-1terminus1
Amit Klein has reported a vulnerability in BIND, which can be exploited by malicious people to poison the DNS cache. The vulnerability is caused due to predictable query IDs in outgoing queries (e.g. if BIND works as resolver or when sending NOTIFYs to slaves) and can be exploited to poison the DNS cache when the query ID is guessed. Reportedly, the chance to guess the next query ID for 50% of the queries (if the query ID is even) is 1 to 8.
- Bug Tracker URL: http://bugs.frugalware.org/task/2285