CVE-2007-3152

c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.
Configurations

Configuration 1

cpe:2.3:a:daniel_stenberg:c-ares:1.3:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.0:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.2:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.1:*:*:*:*:*:*:*

Information

Published : 2007-06-11 10:30

Updated : 2017-07-29 01:32


NVD link : CVE-2007-3152

Mitre link : CVE-2007-3152

Products Affected
No products.