5
CVSSv2

CVE-2007-3153

Published: 11/06/2007 Updated: 29/07/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The ares_init:randomize_key function in c-ares, on platforms other than Windows, uses a weak facility for producing a random number sequence (Unix rand), which makes it easier for remote malicious users to spoof DNS responses by guessing certain values.

Vulnerable Product Search on Vulmon Subscribe to Product

daniel stenberg c-ares 1.0

daniel stenberg c-ares 1.1

daniel stenberg c-ares 1.3.2

daniel stenberg c-ares 1.2

daniel stenberg c-ares 1.2.1

daniel stenberg c-ares 1.3

daniel stenberg c-ares 1.3.1