CVE-2008-4100
Published Sep 18, 2008
Last updated a year ago
Overview
- Description
- GNU adns 1.4 and earlier uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: the vendor reports that this is intended behavior and is compatible with the product's intended role in a trusted environment.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-16
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:adns:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "434C4ED3-43BD-467C-9D8F-7421DFC563D6", "versionEndIncluding": "1.4" }, { "criteria": "cpe:2.3:a:gnu:adns:0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EEE19CD-6E24-4A81-BF54-9D0EE5A27DA0" }, { "criteria": "cpe:2.3:a:gnu:adns:0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64660E8F-F1CA-41E0-8224-5BF9E338B460" }, { "criteria": "cpe:2.3:a:gnu:adns:0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18D77B02-B07D-44EE-A3C1-1562858ECBD5" }, { "criteria": "cpe:2.3:a:gnu:adns:0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "030CD10C-22D3-4767-AB1F-DBF8324D5D91" }, { "criteria": "cpe:2.3:a:gnu:adns:0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6145DA9-C2F3-47F8-9ABA-DFE138F50704" }, { "criteria": "cpe:2.3:a:gnu:adns:0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39C335F3-3105-4BB8-A917-382AF723B86D" }, { "criteria": "cpe:2.3:a:gnu:adns:0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0DD1AB3-408C-4985-BBFB-4F5E775D6F33" }, { "criteria": "cpe:2.3:a:gnu:adns:0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0DD9FC0-8F5F-4CDB-8F44-2D1FA5C2B03C" }, { "criteria": "cpe:2.3:a:gnu:adns:0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AF85609-95B2-492F-9507-A7E7D575B3C8" }, { "criteria": "cpe:2.3:a:gnu:adns:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DFDA2B1-D881-4AA6-886E-3E53E76EFD50" }, { "criteria": "cpe:2.3:a:gnu:adns:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D942ADC-A8FF-4068-8129-1B6F17E67FAD" }, { "criteria": "cpe:2.3:a:gnu:adns:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9776D776-3EEA-437C-BCCA-3998D2314BDF" }, { "criteria": "cpe:2.3:a:gnu:adns:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D685E8A-A979-489E-9572-703E6371457D" } ], "operator": "OR" } ] } ]