7.5
CVE-2007-3152
- EPSS 0.88%
- Veröffentlicht 11.06.2007 22:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Daniel Stenberg ≫ C-ares Version1.0
Daniel Stenberg ≫ C-ares Version1.1
Daniel Stenberg ≫ C-ares Version1.2
Daniel Stenberg ≫ C-ares Version1.2.1
Daniel Stenberg ≫ C-ares Version1.3
Daniel Stenberg ≫ C-ares Version1.3.1
Daniel Stenberg ≫ C-ares Version1.3.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.88% | 0.749 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|