Описание
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | released | 1.8.4-1ubuntu1.6 |
| devel | not-affected | 1.8.7.72-1 |
| feisty | released | 1.8.5-4ubuntu2.3 |
| gutsy | released | 1.8.6.36-1ubuntu3.3 |
| hardy | released | 1.8.6.111-2ubuntu1.2 |
| intrepid | not-affected | 1.8.7.72-1 |
| jaunty | not-affected | 1.8.7.72-1 |
| karmic | not-affected | 1.8.7.72-1 |
| lucid | not-affected | 1.8.7.72-1 |
| maverick | not-affected | 1.8.7.72-1 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | ignored | end of life |
| devel | DNE | pulled 2010-07-27 |
| feisty | ignored | end of life, was needed |
| gutsy | ignored | end of life, was needed |
| hardy | ignored | end of life |
| intrepid | released | 1.9.0.2-7 |
| jaunty | released | 1.9.0.2-7 |
| karmic | released | 1.9.0.2-7 |
| lucid | released | 1.9.0.2-7 |
| maverick | DNE | pulled 2010-07-27 |
Показывать по
EPSS
5.8 Medium
CVSS2
Связанные уязвимости
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 be ...
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
EPSS
5.8 Medium
CVSS2