Vulnerability Details : CVE-2008-3905
Potential exploit
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Products affected by CVE-2008-3905
- cpe:2.3:a:ruby-lang:ruby:*:r18423:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:*:p286:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:*:p71:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.6:*:*:*:*:*:*:*
Threat overview for CVE-2008-3905
Top countries where our scanners detected CVE-2008-3905
Top open port discovered on systems with this issue
443
IPs affected by CVE-2008-3905 1,791
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2008-3905!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2008-3905
3.39%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-3905
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:P |
8.6
|
4.9
|
NIST |
CWE ids for CVE-2008-3905
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-3905
-
http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
Multiple vulnerabilities in RubyPatch
-
http://www.securityfocus.com/bid/31699
-
http://www.redhat.com/support/errata/RHSA-2008-0897.html
-
http://security.gentoo.org/glsa/glsa-200812-17.xml
Ruby: Multiple vulnerabilities (GLSA 200812-17) — Gentoo security
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/45935
-
http://secunia.com/advisories/32219
-
http://secunia.com/advisories/32371
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10034
-
http://www.debian.org/security/2008/dsa-1651
-
http://www.vupen.com/english/advisories/2008/2334
Site en construction
-
http://secunia.com/advisories/32256
-
http://secunia.com/advisories/32948
-
http://www.openwall.com/lists/oss-security/2008/09/04/9
-
http://secunia.com/advisories/33178
About Secunia Research | Flexera
-
http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm
-
http://secunia.com/advisories/31430
About Secunia Research | Flexera
-
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.371754
-
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html
-
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html
-
http://secunia.com/advisories/32255
-
http://secunia.com/advisories/32165
-
http://www.debian.org/security/2008/dsa-1652
-
http://www.openwall.com/lists/oss-security/2008/09/03/3
Exploit
-
https://usn.ubuntu.com/651-1/
Jump to