6.4
CVE-2008-4099
- EPSS 0.72%
- Published 18.09.2008 17:59:32
- Last modified 09.04.2025 00:30:58
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Data is provided by the National Vulnerability Database (NVD)
Debian ≫ Python-dns Version <= 2.3.1-3
Debian ≫ Python-dns Version2.3.0-1
Debian ≫ Python-dns Version2.3.0-2
Debian ≫ Python-dns Version2.3.0-3
Debian ≫ Python-dns Version2.3.0-4
Debian ≫ Python-dns Version2.3.0-5
Debian ≫ Python-dns Version2.3.0-5.1
Debian ≫ Python-dns Version2.3.0-6
Debian ≫ Python-dns Version2.3.1-1
Debian ≫ Python-dns Version2.3.1-2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.72% | 0.702 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.4 | 10 | 4.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:P
|