GNU adns 1.4 and earlier uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: the vendor reports that this is intended behavior and is compatible with the product's intended role in a trusted environment.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T10:00:42.822Z
Reserved: 2008-09-15T00:00:00
Link: CVE-2008-4100

No data.

Status : Modified
Published: 2008-09-18T17:59:32.843
Modified: 2024-11-21T00:50:53.933
Link: CVE-2008-4100
