First published: Wed Aug 13 1997(Updated: )
DNS cache poisoning via BIND, by predictable query IDs.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BIND 9 | =4.9.5 | |
BIND 9 | =8.1 | |
bsdi bsd os | =2.1 | |
bsdi bsd os | =3.0 | |
IBM AIX | =4.1 | |
IBM AIX | =4.2 | |
NEC ASL UX 4800 | =64 | |
NEC EWS-UX V | =4.2 | |
NEC EWS-UX V | =4.2mp | |
NEC UP-UX V | =4.2mp | |
SCO Open Desktop | =3.0 | |
Xinuos OpenServer | =5.0 | |
UNIX | =3.2v4 | |
Xinuos UnixWare | =2.1 | |
Oracle Solaris SPARC | =2.4 | |
Oracle Solaris SPARC | =2.5 | |
Oracle Solaris SPARC | =2.5.1 | |
Oracle Solaris SPARC | =2.6 | |
Sun SunOS | ||
Sun SunOS | =5.3 | |
Sun SunOS | =5.4 | |
Sun SunOS | =5.5 | |
Sun SunOS | =5.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0024 is classified as a high-severity vulnerability due to the potential for DNS cache poisoning.
To fix CVE-1999-0024, upgrade to a newer version of BIND that implements unpredictable query IDs.
CVE-1999-0024 affects BIND versions 4.9.5 and 8.1.
The impact of CVE-1999-0024 includes the potential for attackers to redirect DNS queries to malicious servers.
CVE-1999-0024 affects various platforms including BSD, IBM AIX, and SunOS among others.