6.4
CVSSv2

CVE-2008-4099

Published: 18/09/2008 Updated: 19/09/2008
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

PyDNS (aka python-dns) prior to 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote malicious users to spoof DNS responses, a different vulnerability than CVE-2008-1447.

Vulnerable Product Search on Vulmon Subscribe to Product

debian python-dns 2.3.0-2

debian python-dns 2.3.0-1

debian python-dns

debian python-dns 2.3.1-2

debian python-dns 2.3.1-1

debian python-dns 2.3.0-5.1

debian python-dns 2.3.0-4

debian python-dns 2.3.0-6

debian python-dns 2.3.0-5

debian python-dns 2.3.0-3

Vendor Advisories

Debian Bug report logs - #490217 python-dns vulnerable to CVE-2008-1447 DNS source port guessable Package: python-dns; Maintainer for python-dns is Scott Kitterman <scott@kittermancom>; Source for python-dns is src:python-dns (PTS, buildd, popcon) Reported by: Joe Malicki <jmalicki@metacartacom> Date: Thu, 10 Jul 2 ...