6.4
CVSSv2

CVE-2008-4100

Published: 18/09/2008 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

GNU adns 1.4 and previous versions uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote malicious users to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: the vendor reports that this is intended behavior and is compatible with the product's intended role in a trusted environment.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu adns 0.5

gnu adns 0.9

gnu adns

gnu adns 1.0

gnu adns 0.8

gnu adns 0.2

gnu adns 0.6

gnu adns 1.3

gnu adns 1.2

gnu adns 0.3

gnu adns 1.1

gnu adns 0.4

gnu adns 0.1

gnu adns 0.7

Vendor Advisories

Debian Bug report logs - #492698 appears to be vulnerable to cache poisoning attack CVE-2008-1447 Package: adns; Maintainer for adns is Ian Jackson <ijackson@chiarkgreenendorguk>; Reported by: Thijs Kinkhorst <thijs@debianorg> Date: Mon, 28 Jul 2008 09:48:19 UTC Severity: serious Tags: security Found in version ...