Vulnerability Details : CVE-2007-2241
Unspecified vulnerability in query.c in ISC BIND 9.4.0, and 9.5.0a1 through 9.5.0a3, when recursion is enabled, allows remote attackers to cause a denial of service (daemon exit) via a sequence of queries processed by the query_addsoa function.
Vulnerability category: Denial of service
Products affected by CVE-2007-2241
- cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*
Threat overview for CVE-2007-2241
Top countries where our scanners detected CVE-2007-2241
Top open port discovered on systems with this issue
53
IPs affected by CVE-2007-2241 176
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2007-2241!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2007-2241
8.40%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-2241
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.1
|
HIGH | AV:N/AC:M/Au:N/C:N/I:N/A:C |
8.6
|
6.9
|
NIST |
Vendor statements for CVE-2007-2241
-
Red Hat 2007-05-03Not vulnerable. These issues did not affect the versions of BIND as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
References for CVE-2007-2241
-
http://www.vupen.com/english/advisories/2007/1593
Site en construction
-
http://www.kb.cert.org/vuls/id/718460
VU#718460 - ISC BIND denial of service vulnerabilityUS Government Resource
-
http://www.securityfocus.com/bid/23738
-
http://www.securitytracker.com/id?1017985
GoDaddy Domain Name Search
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/33988
BIND query_addsoa function denial of service CVE-2007-2241 Vulnerability Report
-
http://www.mandriva.com/security/advisories?name=MDKSA-2007:100
Mandriva
-
http://www.isc.org/index.pl?/sw/bind/bind-security.php
Oops! - ISC
Jump to