Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mrjq-p33j-h2vf

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The ares_init:randomize_key function in c-ares, on platforms other than Windows, uses a weak facility for producing a random number sequence (Unix rand), which makes it easier for remote attackers to spoof DNS responses by guessing certain values.

The ares_init:randomize_key function in c-ares, on platforms other than Windows, uses a weak facility for producing a random number sequence (Unix rand), which makes it easier for remote attackers to spoof DNS responses by guessing certain values.

EPSS

Процентиль: 59%
0.00377
Низкий

Связанные уязвимости

nvd
больше 18 лет назад

The ares_init:randomize_key function in c-ares, on platforms other than Windows, uses a weak facility for producing a random number sequence (Unix rand), which makes it easier for remote attackers to spoof DNS responses by guessing certain values.

EPSS

Процентиль: 59%
0.00377
Низкий