Vulnerability Details : CVE-2008-4099
PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Exploit prediction scoring system (EPSS) score for CVE-2008-4099
Probability of exploitation activity in the next 30 days: 1.19%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 83 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-4099
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:P |
10.0
|
4.9
|
nvd@nist.gov |
CWE ids for CVE-2008-4099
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-4099
Products affected by CVE-2008-4099
- cpe:2.3:a:debian:python-dns:*:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.0-2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.0-1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.1-2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.1-1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.0-5.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.0-4:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.0-6:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.0-5:*:*:*:*:*:*:*
- cpe:2.3:a:debian:python-dns:2.3.0-3:*:*:*:*:*:*:*