Bug 462764 (CVE-2008-4099)

Summary: CVE-2008-4099 python-PyDNS: insecure DNS transaction ids
Product: [Other] Security Response Reporter: Josh Bressers <bressers>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jafo
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4099
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-12-23 23:42:13 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 462765, 462766, 462767, 462768    
Bug Blocks:    

Description Josh Bressers 2008-09-18 19:19:02 UTC
PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use
random source ports or transaction IDs for DNS requests, which makes
it easier for remote attackers to spoof DNS responses, a different
vulnerability than CVE-2008-1447.

Comment 1 Josh Bressers 2008-09-18 19:19:38 UTC
Created python-pydns tracking bugs for this issue

Affects: F8 [bug #462765]
Affects: F9 [bug #462766]
Affects: Fdevel [bug #462767]
Affects: epel-5 [bug #462768]

Comment 2 Vincent Danen 2010-12-23 23:42:13 UTC
Current Fedora and EPEL have 2.3.3, so this is no longer an issue there.