RSS   Podatności dla 'Python-dns'   RSS

2008-09-18
 
CVE-2008-4126

CWE-16
 

 
PyDNS (aka python-dns) before 2.3.1-5 in Debian GNU/Linux does not use random source ports for DNS requests and does not use random transaction IDs for DNS retries, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4099.

 
 
CVE-2008-4099

CWE-16
 

 
PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.

 

 >>> Vendor: Debian 97 Produkty
Qpopper
Debian linux
Netkit
Cfingerd
TIN
Horde
Elvis tiny
Sgml-tools
Netstd
Internet message
Mailscanner
Mime-support
FSP
Strongswan
Lintian
Shadow-utils
Debmake
Tetex-bin
Sympa
DPKG
Bsmtpd
Toolchain-source
PPXP
Reportbug
Turba
Apt-cacher
FUSE
TOR
Apt-setup
Backupninja
Kernel-patch-vserver
Libmail-audit-perl
Amaya
Base-config
Apache
GFAX
Debian-goodies
Reprepro
Duplicity
Guilt
UNP
Apt-listchanges
TSS
Aptlinex
Projectl
Honeyd common
Citadel server
Python-dns
Xsabre
FETA
Dpkg-cross
Myspell
Newsgate
Initramfs-tools
Os-prober
LTP
Shadow
Horde imp
Horde groupware
Nss-ldap
APT
Libdbd-pg-perl
Devscripts
Mono-debugger
Tex-common
Apache2
Texlive-extra-utils
Php5-common
Logol
Devotee
Cifs-utils
Trousers
Bsdmainutils
LATD
Txt2man
Adequate
Localepurge
Syncevolution
Axiom
Advanced package tool
Ppthtml
Xbuffy
Dpkg-dev
Kde4libs
Python-imaging
Exuberant ctags
Hivex
Dbd-firebird
Unattended-upgrades
Xbindkeys-config
Ftpsync
Postgresql-common
Devscript
Crossroads
Tmpreaper
Debian-lan-config
PERM


Copyright 2024, cxsecurity.com

 

Back to Top