Описание
A vulnerability was found in kapetan dns up to 6.1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file DNS/Protocol/Request.cs. The manipulation leads to insufficient entropy in prng. The attack may be launched remotely. Upgrading to version 7.0.0 is able to address this issue. The name of the patch is cf7105aa2aae90d6656088fe5a8ee1d5730773b6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216188.
Ссылки
- PatchThird Party Advisory
- PatchThird Party Advisory
- Release NotesThird Party Advisory
- Permissions RequiredThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- Release NotesThird Party Advisory
- Permissions RequiredThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 7.0.0 (исключая)
cpe:2.3:a:kapetan_dns_project:kapetan_dns:*:*:*:*:*:*:*:*
EPSS
Процентиль: 69%
0.006
Низкий
5.6 Medium
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-330
Связанные уязвимости
CVSS3: 9.8
github
около 3 лет назад
DNS NuGet package uses insufficiently random values
EPSS
Процентиль: 69%
0.006
Низкий
5.6 Medium
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-330