Описание
PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | not-affected | 2.3.3-2 |
feisty | ignored | end of life, was needs-triage |
gutsy | ignored | end of life, was needs-triage |
hardy | ignored | end of life |
intrepid | not-affected | 2.3.3-2 |
jaunty | not-affected | 2.3.3-2 |
karmic | not-affected | 2.3.3-2 |
lucid | not-affected | 2.3.3-2 |
maverick | not-affected | 2.3.3-2 |
Показывать по
Ссылки на источники
EPSS
6.4 Medium
CVSS2
Связанные уязвимости
PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use ...
PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
EPSS
6.4 Medium
CVSS2