6.4
CVE-2008-4126
- EPSS 0.71%
- Veröffentlicht 18.09.2008 17:59:33
- Zuletzt bearbeitet 09.04.2025 00:30:58
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
PyDNS (aka python-dns) before 2.3.1-5 in Debian GNU/Linux does not use random source ports for DNS requests and does not use random transaction IDs for DNS retries, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4099.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Debian ≫ Python-dns Version <= 2.3.1-4
Debian ≫ Python-dns Version2.3.0-1
Debian ≫ Python-dns Version2.3.0-2
Debian ≫ Python-dns Version2.3.0-3
Debian ≫ Python-dns Version2.3.0-4
Debian ≫ Python-dns Version2.3.0-5
Debian ≫ Python-dns Version2.3.0-5.1
Debian ≫ Python-dns Version2.3.0-6
Debian ≫ Python-dns Version2.3.1-1
Debian ≫ Python-dns Version2.3.1-2
Debian ≫ Python-dns Version2.3.1-3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.71% | 0.699 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.4 | 10 | 4.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:P
|