CVE-2008-4100

GNU adns 1.4 and earlier uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: the vendor reports that this is intended behavior and is compatible with the product's intended role in a trusted environment.
Configurations

Configuration 1

cpe:2.3:a:gnu:adns:0.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:1.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:1.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:1.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:1.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:adns:0.7:*:*:*:*:*:*:*

Information

Published : 2008-09-18 05:59

Updated : 2023-02-13 02:19


NVD link : CVE-2008-4100

Mitre link : CVE-2008-4100

Products Affected
CWE