CVE-2002-2211

BIND 4 and BIND 8, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:isc:bind:4.9:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.5:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.6:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.7:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.8:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.9:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.10:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.2:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.2:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.2:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.2:p4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.2:p5:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.2:p6:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.2:p7:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.6:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.7:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.3.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.3.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.3.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.3.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.3.4:*:*:*:*:*:*:*

History

20 Nov 2024, 23:43

Type Values Removed Values Added
References () http://lists.apple.com/archives/Security-announce/2002/Nov/msg00000.html - () http://lists.apple.com/archives/Security-announce/2002/Nov/msg00000.html -
References () http://secunia.com/advisories/20217 - Vendor Advisory () http://secunia.com/advisories/20217 - Vendor Advisory
References () http://www.imconf.net/imw-2002/imw2002-papers/198.pdf - () http://www.imconf.net/imw-2002/imw2002-papers/198.pdf -
References () http://www.kb.cert.org/vuls/id/457875 - US Government Resource () http://www.kb.cert.org/vuls/id/457875 - US Government Resource
References () http://www.kb.cert.org/vuls/id/IAFY-5FDPYP - () http://www.kb.cert.org/vuls/id/IAFY-5FDPYP -
References () http://www.kb.cert.org/vuls/id/IAFY-5FDT4U - () http://www.kb.cert.org/vuls/id/IAFY-5FDT4U -
References () http://www.kb.cert.org/vuls/id/IAFY-5FZSLQ - () http://www.kb.cert.org/vuls/id/IAFY-5FZSLQ -
References () http://www.rnp.br/cais/alertas/2002/cais-ALR-19112002a.html - Patch () http://www.rnp.br/cais/alertas/2002/cais-ALR-19112002a.html - Patch
References () http://www.securityfocus.com/archive/1/434523/100/0/threaded - () http://www.securityfocus.com/archive/1/434523/100/0/threaded -
References () http://www.vupen.com/english/advisories/2006/1923 - () http://www.vupen.com/english/advisories/2006/1923 -

Information

Published : 2002-12-31 05:00

Updated : 2024-11-20 23:43


NVD link : CVE-2002-2211

Mitre link : CVE-2002-2211

CVE.ORG link : CVE-2002-2211


JSON object : View

Products Affected

isc

  • bind