Skip to main content

CVE-1999-0024: DNS cache poisoning via BIND, by predictable query IDs.

Medium
VulnerabilityCVE-1999-0024cve-1999-0024
Published: Wed Aug 13 1997 (08/13/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: isc
Product: bind

Description

DNS cache poisoning via BIND, by predictable query IDs.

AI-Powered Analysis

AILast updated: 07/01/2025, 23:26:59 UTC

Technical Analysis

CVE-1999-0024 is a vulnerability affecting multiple versions of the BIND (Berkeley Internet Name Domain) DNS server software, specifically versions ranging from early 2.x releases through 8.1. The core issue is DNS cache poisoning enabled by predictable query IDs used in DNS requests. DNS cache poisoning occurs when an attacker is able to insert false DNS records into the cache of a DNS resolver, causing it to return incorrect IP addresses for domain names. This can redirect users to malicious sites without their knowledge. The vulnerability arises because the query IDs, which are supposed to be random and unpredictable to prevent spoofing, are instead predictable. An attacker can exploit this by sending forged DNS responses with matching query IDs before the legitimate response arrives, thereby poisoning the cache. This attack compromises the integrity of DNS responses but does not directly affect confidentiality or availability. The vulnerability requires no authentication and can be exploited remotely over the network. The CVSS score of 5 (medium severity) reflects that the attack impacts integrity (I:P) but not confidentiality or availability, and that the attack vector is network-based with low complexity and no authentication required. Notably, no patches are available for this vulnerability, likely due to its age and the fact that modern BIND versions have addressed this issue by implementing more secure randomization of query IDs and additional mitigations. There are no known exploits in the wild currently documented, but the fundamental nature of the vulnerability means it was a significant risk at the time of discovery. This vulnerability is historically important as it influenced the development of DNS security practices and protocols such as DNSSEC.

Potential Impact

For European organizations, the impact of this vulnerability historically was significant because DNS is a foundational internet service. Successful exploitation could allow attackers to redirect users to fraudulent websites, enabling phishing, malware distribution, or interception of sensitive communications. This could lead to compromised credentials, data breaches, and disruption of trust in online services. Although modern DNS infrastructure has largely mitigated this risk, legacy systems or outdated BIND versions still in use within some organizations or critical infrastructure could be vulnerable. This is particularly concerning for sectors relying heavily on DNS integrity, such as financial institutions, government agencies, and telecommunications providers. The integrity compromise could also facilitate man-in-the-middle attacks and undermine secure communications. Given the lack of patches, organizations relying on affected BIND versions would need to upgrade or replace vulnerable software to mitigate risk.

Mitigation Recommendations

Since no patches are available for the affected legacy BIND versions, the primary mitigation is to upgrade to a modern, supported version of BIND that implements robust query ID randomization and other DNS security enhancements. Organizations should audit their DNS infrastructure to identify any legacy BIND servers still in operation and plan immediate replacement or upgrade. Additionally, deploying DNSSEC (Domain Name System Security Extensions) can provide cryptographic validation of DNS responses, preventing cache poisoning attacks even if query IDs are predictable. Network-level mitigations include restricting DNS server access to trusted clients, implementing firewall rules to limit DNS traffic, and monitoring DNS traffic for anomalies indicative of poisoning attempts. Employing DNS resolver software with built-in protections against cache poisoning is also recommended. Finally, organizations should educate IT staff on the risks of legacy DNS software and maintain an up-to-date asset inventory to avoid running unsupported versions.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7de7a1

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 11:26:59 PM

Last updated: 8/15/2025, 3:43:05 AM

Views: 34

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats