CVE-2008-4100
Severity CVSS v4.0:
Pending analysis
Type:
CWE-16
Configuration Errors
Publication date:
18/09/2008
Last modified:
09/04/2025
Description
GNU adns 1.4 and earlier uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: the vendor reports that this is intended behavior and is compatible with the product's intended role in a trusted environment.
Impact
Base Score 2.0
6.40
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:gnu:adns:*:*:*:*:*:*:*:* | 1.4 (including) | |
cpe:2.3:a:gnu:adns:0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:adns:0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:adns:0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:adns:0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:adns:0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:adns:0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:adns:0.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:adns:0.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:adns:0.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:adns:1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:adns:1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:adns:1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:adns:1.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698
- http://www.openwall.com/lists/oss-security/2008/09/11/1
- http://www.openwall.com/lists/oss-security/2008/09/16/4
- https://www.exploit-db.com/exploits/6197
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698
- http://www.openwall.com/lists/oss-security/2008/09/11/1
- http://www.openwall.com/lists/oss-security/2008/09/16/4
- https://www.exploit-db.com/exploits/6197