CVE-2008-4099
Published: 18 September 2008
PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Notes
Author | Note |
---|---|
kees | This issue may have already been solved with other uploads. |
Priority
Status
Package | Release | Status |
---|---|---|
python-dns Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
feisty |
Ignored
(end of life, was needs-triage)
|
|
gutsy |
Ignored
(end of life, was needs-triage)
|
|
hardy |
Ignored
(end of life)
|
|
intrepid |
Not vulnerable
(2.3.3-2)
|
|
jaunty |
Not vulnerable
(2.3.3-2)
|
|
karmic |
Not vulnerable
(2.3.3-2)
|
|
lucid |
Not vulnerable
(2.3.3-2)
|
|
maverick |
Not vulnerable
(2.3.3-2)
|
|
natty |
Not vulnerable
(2.3.3-2)
|
|
oneiric |
Not vulnerable
(2.3.3-2)
|
|
upstream |
Released
(2.3.1-5)
|