Lucene search

K
nvd[email protected]NVD:CVE-2008-4126
HistorySep 18, 2008 - 5:59 p.m.

CVE-2008-4126

2008-09-1817:59:33
CWE-16
web.nvd.nist.gov
1

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

6.6 Medium

AI Score

Confidence

High

0.133 Low

EPSS

Percentile

95.6%

PyDNS (aka python-dns) before 2.3.1-5 in Debian GNU/Linux does not use random source ports for DNS requests and does not use random transaction IDs for DNS retries, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4099.

Affected configurations

NVD
Node
debianpython-dnsRange2.3.1-4
OR
debianpython-dnsMatch2.3.0-1
OR
debianpython-dnsMatch2.3.0-2
OR
debianpython-dnsMatch2.3.0-3
OR
debianpython-dnsMatch2.3.0-4
OR
debianpython-dnsMatch2.3.0-5
OR
debianpython-dnsMatch2.3.0-5.1
OR
debianpython-dnsMatch2.3.0-6
OR
debianpython-dnsMatch2.3.1-1
OR
debianpython-dnsMatch2.3.1-2
OR
debianpython-dnsMatch2.3.1-3
AND
debianlinuxMatchunknownunknownetch

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

6.6 Medium

AI Score

Confidence

High

0.133 Low

EPSS

Percentile

95.6%