First published: Thu Sep 04 2008(Updated: )
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby-lang Ruby | <=1.8.5 | |
Ruby-lang Ruby | <=1.8.6 | |
Ruby-lang Ruby | <=1.8.7 | |
Ruby-lang Ruby | <=1.9 | |
Ruby-lang Ruby | =1.6 | |
Ruby-lang Ruby | =1.6.8 | |
Ruby-lang Ruby | =1.8.0 | |
Ruby-lang Ruby | =1.8.1 | |
Ruby-lang Ruby | =1.8.2 | |
Ruby-lang Ruby | =1.8.3 | |
Ruby-lang Ruby | =1.8.4 | |
Ruby-lang Ruby | =1.8.6 | |
Ruby-lang Ruby | =1.8.6-p110 | |
Ruby-lang Ruby | =1.8.6-p111 | |
Ruby-lang Ruby | =1.8.6-p114 | |
Ruby-lang Ruby | =1.8.6-p230 | |
Ruby-lang Ruby | =1.8.6-p36 | |
Ruby-lang Ruby | =1.8.6-preview1 | |
Ruby-lang Ruby | =1.8.6-preview2 | |
Ruby-lang Ruby | =1.8.6-preview3 | |
Ruby-lang Ruby | =1.8.7 | |
Ruby-lang Ruby | =1.8.7-p17 | |
Ruby-lang Ruby | =1.8.7-p22 | |
Ruby-lang Ruby | =1.8.7-preview1 | |
Ruby-lang Ruby | =1.8.7-preview2 | |
Ruby-lang Ruby | =1.8.7-preview3 | |
Ruby-lang Ruby | =1.8.7-preview4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.