Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9547-8gx6-787g

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.

PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.

EPSS

Процентиль: 72%
0.00724
Низкий

Связанные уязвимости

ubuntu
почти 17 лет назад

PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.

redhat
около 17 лет назад

PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.

nvd
почти 17 лет назад

PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.

debian
почти 17 лет назад

PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use ...

EPSS

Процентиль: 72%
0.00724
Низкий