The ares_init:randomize_key function in c-ares, on platforms other than Windows, uses a weak facility for producing a random number sequence (Unix rand), which makes it easier for remote attackers to spoof DNS responses by guessing certain values.
2007-06-11T22:30:00.000
2025-04-09T00:30:58.490
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:P/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | daniel_stenberg | c-ares | 1.0 | Yes |
Application | daniel_stenberg | c-ares | 1.1 | Yes |
Application | daniel_stenberg | c-ares | 1.2 | Yes |
Application | daniel_stenberg | c-ares | 1.2.1 | Yes |
Application | daniel_stenberg | c-ares | 1.3 | Yes |
Application | daniel_stenberg | c-ares | 1.3.1 | Yes |
Application | daniel_stenberg | c-ares | 1.3.2 | Yes |