Lucene search

K
cve[email protected]CVE-2008-4126
HistoryOct 03, 2022 - 4:13 p.m.

CVE-2008-4126

2022-10-0316:13:59
CWE-16
web.nvd.nist.gov
34
pydns
python-dns
debian gnu/linux
dns requests
dns security
cve-2008-4126

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

6.7 Medium

AI Score

Confidence

High

0.133 Low

EPSS

Percentile

95.6%

PyDNS (aka python-dns) before 2.3.1-5 in Debian GNU/Linux does not use random source ports for DNS requests and does not use random transaction IDs for DNS retries, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4099.

Affected configurations

NVD
Node
debianpython-dnsRange2.3.1-4
OR
debianpython-dnsMatch2.3.0-1
OR
debianpython-dnsMatch2.3.0-2
OR
debianpython-dnsMatch2.3.0-3
OR
debianpython-dnsMatch2.3.0-4
OR
debianpython-dnsMatch2.3.0-5
OR
debianpython-dnsMatch2.3.0-5.1
OR
debianpython-dnsMatch2.3.0-6
OR
debianpython-dnsMatch2.3.1-1
OR
debianpython-dnsMatch2.3.1-2
OR
debianpython-dnsMatch2.3.1-3
AND
debianlinuxMatchunknownunknownetch

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

6.7 Medium

AI Score

Confidence

High

0.133 Low

EPSS

Percentile

95.6%