resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1651-1 | New ruby1.8 packages fix several vulnerabilities |
Debian DSA |
DSA-1652-1 | New ruby1.9 packages fix several vulnerabilities |
EUVD |
EUVD-2008-3891 | resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. |
Ubuntu USN |
USN-651-1 | Ruby vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T09:53:00.497Z
Reserved: 2008-09-04T00:00:00
Link: CVE-2008-3905
No data.
Status : Deferred
Published: 2008-09-04T17:41:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-3905
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN