Last updated on AUGUST 26, 2013
Applies to:Oracle Communications Policy Services - Version: 4.2.2
Recently, a vulnerability has been identified in ISC BIND, which could be exploited by attackers to gain knowledge of sensitive information and poison a DNS cache. This issue is caused by an error within the DNS query ID generation code when answering questions as a resolver or when sending NOTIFYs to slave name servers, which could allow attackers to potentially guess the next query ID and perform cache poisoning.
Sign In with your My Oracle Support account
Don't have a My Oracle Support account? Click to get started
Million Knowledge Articles and hundreds of Community platforms