resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1651-1 | New ruby1.8 packages fix several vulnerabilities |
![]() |
DSA-1652-1 | New ruby1.9 packages fix several vulnerabilities |
![]() |
EUVD-2008-3891 | resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. |
![]() |
USN-651-1 | Ruby vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T09:53:00.497Z
Reserved: 2008-09-04T00:00:00
Link: CVE-2008-3905

No data.

Status : Deferred
Published: 2008-09-04T17:41:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-3905


No data.