First published: Thu Sep 18 2008(Updated: )
PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Python 3 Debian | <=2.3.1-3 | |
Python 3 Debian | =2.3.0-1 | |
Python 3 Debian | =2.3.0-2 | |
Python 3 Debian | =2.3.0-3 | |
Python 3 Debian | =2.3.0-4 | |
Python 3 Debian | =2.3.0-5 | |
Python 3 Debian | =2.3.0-5.1 | |
Python 3 Debian | =2.3.0-6 | |
Python 3 Debian | =2.3.1-1 | |
Python 3 Debian | =2.3.1-2 | |
Debian | =unknown-unknown |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4099 is considered to be a medium severity vulnerability due to the risk of DNS spoofing.
To fix CVE-2008-4099, upgrade to python-dns version 2.3.1-4 or later in Debian GNU/Linux.
CVE-2008-4099 affects python-dns versions up to and including 2.3.1-3 and specific earlier versions of python-dns.
CVE-2008-4099 allows remote attackers to spoof DNS responses due to predictable source ports and transaction IDs.
Yes, CVE-2008-4099 is specific to Debian GNU/Linux systems using the vulnerable versions of python-dns.