CVE-2008-4100
18.09.2008, 17:59
GNU adns 1.4 and earlier uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: the vendor reports that this is intended behavior and is compatible with the product's intended role in a trusted environment.Enginsight
Vendor | Product | Version |
---|---|---|
gnu | adns | 𝑥 ≤ 1.4 |
gnu | adns | 0.1 |
gnu | adns | 0.2 |
gnu | adns | 0.3 |
gnu | adns | 0.4 |
gnu | adns | 0.5 |
gnu | adns | 0.6 |
gnu | adns | 0.7 |
gnu | adns | 0.8 |
gnu | adns | 0.9 |
gnu | adns | 1.0 |
gnu | adns | 1.1 |
gnu | adns | 1.2 |
gnu | adns | 1.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References