6.4
CVE-2008-4126
- EPSS 0.71%
- Veröffentlicht 18.09.2008 17:59:33
- Zuletzt bearbeitet 09.04.2025 00:30:58
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
PyDNS (aka python-dns) before 2.3.1-5 in Debian GNU/Linux does not use random source ports for DNS requests and does not use random transaction IDs for DNS retries, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4099.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Debian ≫ Python-dns Version <= 2.3.1-4
Debian ≫ Python-dns Version2.3.0-1
Debian ≫ Python-dns Version2.3.0-2
Debian ≫ Python-dns Version2.3.0-3
Debian ≫ Python-dns Version2.3.0-4
Debian ≫ Python-dns Version2.3.0-5
Debian ≫ Python-dns Version2.3.0-5.1
Debian ≫ Python-dns Version2.3.0-6
Debian ≫ Python-dns Version2.3.1-1
Debian ≫ Python-dns Version2.3.1-2
Debian ≫ Python-dns Version2.3.1-3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.71% | 0.699 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.4 | 10 | 4.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:P
|