First published: Thu Sep 18 2008(Updated: )
PyDNS (aka python-dns) before 2.3.1-5 in Debian GNU/Linux does not use random source ports for DNS requests and does not use random transaction IDs for DNS retries, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4099.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python 3 Debian | <=2.3.1-4 | |
Python 3 Debian | =2.3.0-1 | |
Python 3 Debian | =2.3.0-2 | |
Python 3 Debian | =2.3.0-3 | |
Python 3 Debian | =2.3.0-4 | |
Python 3 Debian | =2.3.0-5 | |
Python 3 Debian | =2.3.0-5.1 | |
Python 3 Debian | =2.3.0-6 | |
Python 3 Debian | =2.3.1-1 | |
Python 3 Debian | =2.3.1-2 | |
Python 3 Debian | =2.3.1-3 | |
Debian | =unknown-unknown |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4126 is considered a medium severity vulnerability due to its potential to allow DNS spoofing attacks.
To fix CVE-2008-4126, upgrade to version 2.3.1-5 or later of the python-dns package on Debian.
CVE-2008-4126 affects python-dns versions prior to 2.3.1-5 on Debian systems.
The implications of CVE-2008-4126 include an increased risk of DNS response spoofing, which can lead to man-in-the-middle attacks.
CVE-2008-4126 is a remote vulnerability, allowing attackers to exploit it over a network.