CVE-2007-2930

Description

The (1) NSID_SHUFFLE_ONLY and (2) NSID_USE_POOL PRNG algorithms in ISC BIND 8 before 8.4.7-P1 generate predictable DNS query identifiers when sending outgoing queries such as NOTIFY messages when answering questions as a resolver, which allows remote attackers to poison DNS caches via unknown vectors. NOTE: this issue is different from CVE-2007-2926.

4.3
CVSS
Severity: Medium
CVSS 2.0 •
EPSS 18.64% Top 10%
Vendor Advisory sun.com Vendor Advisory hp.com Vendor Advisory sun.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://support.avaya.com/elmodocs2/security/ASA-2007-448.htm
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200859-1 vendor advisory
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=653968
http://www.vupen.com/english/advisories/2007/3936 vdb entry
http://secunia.com/advisories/27433 third party advisory
http://www.securityfocus.com/archive/1/481424/100/0/threaded mailing list
http://www.vupen.com/english/advisories/2007/3192 vdb entry
http://www.vupen.com/english/advisories/2007/2991 vdb entry
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01283837 vendor advisory
http://secunia.com/advisories/26629 third party advisory
http://www.securitytracker.com/id?1018615 vdb entry
http://www.trusteer.com/docs/bind8dns.html
http://secunia.com/advisories/27459 third party advisory
http://www.securityfocus.com/bid/25459 vdb entry
http://www.vupen.com/english/advisories/2007/3668 vdb entry
http://secunia.com/advisories/27696 third party advisory
http://www.isc.org/index.pl?/sw/bind/bind8-eol.php patch
http://www.securityfocus.com/archive/1/477870/100/100/threaded mailing list
http://secunia.com/advisories/27465 third party advisory
http://www.vupen.com/english/advisories/2007/3639 vdb entry
http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2007/43/022954-01.pdf
http://secunia.com/advisories/26858 third party advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2154 signature vdb entry
http://www.kb.cert.org/vuls/id/927905 patch third party advisory us government resource
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103063-1 vendor advisory
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3975
http://www.ciac.org/ciac/bulletins/r-333.shtml third party advisory government resource patch
http://www.securityfocus.com/archive/1/481659/100/0/threaded mailing list

Frequently Asked Questions

What is the severity of CVE-2007-2930?
CVE-2007-2930 has been scored as a medium severity vulnerability.
How to fix CVE-2007-2930?
To fix CVE-2007-2930, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2007-2930 being actively exploited in the wild?
It is possible that CVE-2007-2930 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~19% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.