CVE-2008-3905
Published: 4 September 2008
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Priority
Status
Package | Release | Status |
---|---|---|
ruby1.8 Launchpad, Ubuntu, Debian |
dapper |
Released
(1.8.4-1ubuntu1.6)
|
feisty |
Released
(1.8.5-4ubuntu2.3)
|
|
gutsy |
Released
(1.8.6.36-1ubuntu3.3)
|
|
hardy |
Released
(1.8.6.111-2ubuntu1.2)
|
|
intrepid |
Not vulnerable
(1.8.7.72-1)
|
|
jaunty |
Not vulnerable
(1.8.7.72-1)
|
|
karmic |
Not vulnerable
(1.8.7.72-1)
|
|
lucid |
Not vulnerable
(1.8.7.72-1)
|
|
maverick |
Not vulnerable
(1.8.7.72-1)
|
|
natty |
Not vulnerable
(1.8.7.72-1)
|
|
oneiric |
Not vulnerable
(1.8.7.72-1)
|
|
upstream |
Released
(1.8.7.72-1)
|
|
ruby1.9 Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
feisty |
Ignored
(end of life, was needed)
|
|
gutsy |
Ignored
(end of life, was needed)
|
|
hardy |
Ignored
(end of life)
|
|
intrepid |
Released
(1.9.0.2-7)
|
|
jaunty |
Released
(1.9.0.2-7)
|
|
karmic |
Released
(1.9.0.2-7)
|
|
lucid |
Released
(1.9.0.2-7)
|
|
maverick |
Does not exist
(pulled 2010-07-27)
|
|
natty |
Does not exist
(pulled 2010-07-27)
|
|
oneiric |
Does not exist
(pulled 2010-07-27)
|
|
upstream |
Released
(1.9.0.2-7)
|