CVE-2008-4099
18.09.2008, 17:59
PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.Enginsight
Vendor | Product | Version |
---|---|---|
debian | python-dns | 𝑥 ≤ 2.3.1-3 |
debian | python-dns | 2.3.0-1 |
debian | python-dns | 2.3.0-2 |
debian | python-dns | 2.3.0-3 |
debian | python-dns | 2.3.0-4 |
debian | python-dns | 2.3.0-5 |
debian | python-dns | 2.3.0-5.1 |
debian | python-dns | 2.3.0-6 |
debian | python-dns | 2.3.1-1 |
debian | python-dns | 2.3.1-2 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References