Описание
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 1.8.4-1ubuntu1.6 |
devel | not-affected | 1.8.7.72-1 |
feisty | released | 1.8.5-4ubuntu2.3 |
gutsy | released | 1.8.6.36-1ubuntu3.3 |
hardy | released | 1.8.6.111-2ubuntu1.2 |
intrepid | not-affected | 1.8.7.72-1 |
jaunty | not-affected | 1.8.7.72-1 |
karmic | not-affected | 1.8.7.72-1 |
lucid | not-affected | 1.8.7.72-1 |
maverick | not-affected | 1.8.7.72-1 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | DNE | pulled 2010-07-27 |
feisty | ignored | end of life, was needed |
gutsy | ignored | end of life, was needed |
hardy | ignored | end of life |
intrepid | released | 1.9.0.2-7 |
jaunty | released | 1.9.0.2-7 |
karmic | released | 1.9.0.2-7 |
lucid | released | 1.9.0.2-7 |
maverick | DNE | pulled 2010-07-27 |
Показывать по
EPSS
5.8 Medium
CVSS2
Связанные уязвимости
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 be ...
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
EPSS
5.8 Medium
CVSS2