First published: Wed Sep 10 2008(Updated: )
mDNSResponder in Apple Bonjour for Windows before 1.0.5, when an application uses the Bonjour API for unicast DNS, does not choose random values for transaction IDs or source ports in DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Bonjour | =1.0.4-unknown | |
Microsoft Windows NT | =xp-sp3 | |
Microsoft Windows 2000 | ||
Microsoft Windows 2003 Server | ||
Microsoft Windows Vista | ||
Microsoft Windows XP | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3630 has a moderate severity level due to its potential for DNS response spoofing.
To fix CVE-2008-3630, upgrade to Apple Bonjour version 1.0.5 or later.
Apple Bonjour versions prior to 1.0.5 are affected by CVE-2008-3630.
No, CVE-2008-3630 specifically affects Apple Bonjour for Windows before version 1.0.5.
CVE-2008-3630 is associated with DNS spoofing attacks due to predictable transaction IDs.