Vulnerability Details : CVE-2007-3898
The DNS server in Microsoft Windows 2000 Server SP4, and Server 2003 SP1 and SP2, uses predictable transaction IDs when querying other DNS servers, which allows remote attackers to spoof DNS replies, poison the DNS cache, and facilitate further attack vectors.
Exploit prediction scoring system (EPSS) score for CVE-2007-3898
Probability of exploitation activity in the next 30 days: 96.83%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-3898
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:P |
10.0
|
4.9
|
[email protected] |
CWE ids for CVE-2007-3898
-
Assigned by: [email protected] (Primary)
References for CVE-2007-3898
-
http://www.trusteer.com/docs/windowsdns.html
-
http://www.securityfocus.com/archive/1/483635/100/0/threaded
-
http://www.securityfocus.com/archive/1/483698/100/0/threaded
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4395
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-062
-
http://www.us-cert.gov/cas/techalerts/TA07-317A.html
US Government Resource
-
http://www.securitytracker.com/id?1018942
-
http://securityreason.com/securityalert/3373
-
http://www.securityfocus.com/bid/25919
Exploit;Patch
-
http://www.kb.cert.org/vuls/id/484649
US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/36805
- http://www.securityfocus.com/archive/1/484186/100/0/threaded
-
http://www.scanit.be/advisory-2007-11-14.html
-
http://www.vupen.com/english/advisories/2007/3848
Products affected by CVE-2007-3898
- cpe:2.3:o:microsoft:windows_2000:*:sp3:datacenter_srv:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp4:datacenter_srv:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:gold:srv:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp4:adv_srv:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp3:srv:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp1:datacenter_srv:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:gold:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:gold:datacenter_srv:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp2:adv_srv:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp3:adv_srv:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp1:srv:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp4:srv:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp2:srv:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp1:adv_srv:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp2:datacenter_srv:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:gold:adv_srv:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:gold:std:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:sp2:std:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:gold:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:gold:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:gold:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:sp1:std:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:gold:x64-std:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2003:*:-:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*