Описание
c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.
Ссылки
- PatchVendor Advisory
- Patch
- PatchVendor Advisory
- Patch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:daniel_stenberg:c-ares:1.0:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.1:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.2:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.3:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.3.2:*:*:*:*:*:*:*
EPSS
Процентиль: 75%
0.00877
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.
EPSS
Процентиль: 75%
0.00877
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other