CVE-2008-4100

GNU adns 1.4 and earlier uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: the vendor reports that this is intended behavior and is compatible with the product's intended role in a trusted environment.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:adns:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:1.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:1.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:1.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:1.3:*:*:*:*:*:*:*

History

07 Nov 2023, 02:02

Type Values Removed Values Added
Summary GNU adns 1.4 and earlier uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: the vendor reports that this is intended behavior and is compatible with the product's intended role in a trusted environment. GNU adns 1.4 and earlier uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: the vendor reports that this is intended behavior and is compatible with the product's intended role in a trusted environment.

Information

Published : 2008-09-18 17:59

Updated : 2024-02-28 11:21


NVD link : CVE-2008-4100

Mitre link : CVE-2008-4100

CVE.ORG link : CVE-2008-4100


JSON object : View

Products Affected

gnu

  • adns
CWE
CWE-16

Configuration