Red Hat, Inc. Information for VU#800113

Multiple DNS implementations vulnerable to cache poisoning

Status

Affected

Vendor Statement

Updated BIND packages which implement UDP source randomization have

been made available for Red Hat Enterprise Linux 2.1, 3, 4, and 5:
https://rhn.redhat.com/errata/RHSA-2008-0533.html

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

None

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.