resolv.rb in Ruby 1.8.5 and previous versions, 1.8.6 prior to 1.8.6-p287, 1.8.7 prior to 1.8.7-p72, and 1.9 r18423 and previous versions uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote malicious users to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ruby-lang ruby 1.8.3 |
||
ruby-lang ruby 1.8.4 |
||
ruby-lang ruby 1.8.6 |
||
ruby-lang ruby 1.8.7 |
||
ruby-lang ruby |
||
ruby-lang ruby 1.8.1 |
||
ruby-lang ruby 1.8.2 |
||
ruby-lang ruby 1.6.8 |
||
ruby-lang ruby 1.8.0 |
||
ruby-lang ruby 1.6 |