GNU adns 1.4 and earlier uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: the vendor reports that this is intended behavior and is compatible with the product's intended role in a trusted environment.
2008-09-18T17:59:32.843
2025-04-09T00:30:58.490
Deferred
CVSSv2: 6.4 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:P/A:P
10.0
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | gnu | adns | ≤ 1.4 | Yes |
Application | gnu | adns | 0.1 | Yes |
Application | gnu | adns | 0.2 | Yes |
Application | gnu | adns | 0.3 | Yes |
Application | gnu | adns | 0.4 | Yes |
Application | gnu | adns | 0.5 | Yes |
Application | gnu | adns | 0.6 | Yes |
Application | gnu | adns | 0.7 | Yes |
Application | gnu | adns | 0.8 | Yes |
Application | gnu | adns | 0.9 | Yes |
Application | gnu | adns | 1.0 | Yes |
Application | gnu | adns | 1.1 | Yes |
Application | gnu | adns | 1.2 | Yes |
Application | gnu | adns | 1.3 | Yes |