[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-3905Date: (C)2008-09-04   (M)2023-12-22


resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.8
Exploit Score: 8.6
Impact Score: 4.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECUNIA-31430
BID-31699
SECUNIA-32165
SECUNIA-32219
SECUNIA-32255
SECUNIA-32256
SECUNIA-32371
SECUNIA-32948
SECUNIA-33178
ADV-2008-2334
DSA-1651
DSA-1652
FEDORA-2008-8736
FEDORA-2008-8738
GLSA-200812-17
RHSA-2008:0897
SSA:2008-334-01
USN-651-1
http://www.openwall.com/lists/oss-security/2008/09/03/3
http://www.openwall.com/lists/oss-security/2008/09/04/9
http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm
http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
oval:org.mitre.oval:def:10034
ruby-resolv-dns-spoofing(45935)

CPE    8
cpe:/a:ruby-lang:ruby:1.8.7:p22
cpe:/a:ruby-lang:ruby:1.8.7:preview2
cpe:/a:ruby-lang:ruby:1.8.7:preview1
cpe:/a:ruby-lang:ruby:1.8.7:preview4
...
CWE    1
CWE-287
OVAL    4
oval:org.secpod.oval:def:301443
oval:org.mitre.oval:def:7935
oval:org.secpod.oval:def:400065
oval:org.mitre.oval:def:8055
...

© SecPod Technologies