Описание
uClibc-ng through 1.0.40 and uClibc through 0.9.33.2 use predictable DNS transaction IDs that may lead to DNS cache poisoning. This is related to a reset of a value to 0x2.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | DNE | |
| esm-infra/focal | DNE | |
| focal | DNE | |
| jammy | DNE | |
| trusty | DNE | |
| upstream | released | 1.0.41-1 |
| xenial | DNE |
Показывать по
EPSS
4 Medium
CVSS2
6.5 Medium
CVSS3
Связанные уязвимости
uClibc-ng through 1.0.40 and uClibc through 0.9.33.2 use predictable DNS transaction IDs that may lead to DNS cache poisoning. This is related to a reset of a value to 0x2.
uClibc-ng through 1.0.40 and uClibc through 0.9.33.2 use predictable D ...
uClibc-ng through 1.0.40 and uClibc through 0.9.33.2 use predictable DNS transaction IDs that may lead to DNS cache poisoning. This is related to a reset of a value to 0x2.
Уязвимость библиотек языка программирования C uClibc и uClibc-ng, связанная с возможностью использования предикабельных идентификаторов транзакций при выполнении DNS-запросов, позволяющая нарушителю перенаправить пользователя на произвольные сайты
EPSS
4 Medium
CVSS2
6.5 Medium
CVSS3