GNU adns 1.4 and earlier uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: the vendor reports that this is intended behavior and is compatible with the product's intended role in a trusted environment.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2008-09-18T17:47:00
Updated: 2024-08-07T10:00:42.822Z
Reserved: 2008-09-15T00:00:00
Link: CVE-2008-4100
Vulnrichment
No data.
NVD
Status : Modified
Published: 2008-09-18T17:59:32.843
Modified: 2024-11-21T00:50:53.933
Link: CVE-2008-4100
Redhat