c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.
2007-06-11T22:30:00.000
2025-04-09T00:30:58.490
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | daniel_stenberg | c-ares | 1.0 | Yes |
Application | daniel_stenberg | c-ares | 1.1 | Yes |
Application | daniel_stenberg | c-ares | 1.2 | Yes |
Application | daniel_stenberg | c-ares | 1.2.1 | Yes |
Application | daniel_stenberg | c-ares | 1.3 | Yes |
Application | daniel_stenberg | c-ares | 1.3.1 | Yes |
Application | daniel_stenberg | c-ares | 1.3.2 | Yes |