Vulnerability Details : CVE-2008-4099
PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Products affected by CVE-2008-4099
- cpe:2.3:a:debian:python-dns:*:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.0-2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.0-1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.1-2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.1-1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.0-5.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.0-4:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.0-6:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.0-5:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.0-3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-4099
1.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-4099
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:P |
10.0
|
4.9
|
NIST |
CWE ids for CVE-2008-4099
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-4099
-
http://www.openwall.com/lists/oss-security/2008/09/11/1
oss-security - Re: CVE Request (ruby -- DNS spoofing vulnerability in resolv.rb)
-
http://packages.debian.org/changelogs/pool/main/p/python-dns/python-dns_2.3.3-1/changelog
404 Not Found
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490217
#490217 - python-dns vulnerable to CVE-2008-1447 DNS source port guessable - Debian Bug report logsExploit
-
http://www.openwall.com/lists/oss-security/2008/09/16/4
oss-security - Re: CVE Request (ruby -- DNS spoofing vulnerability in resolv.rb)
Jump to