Bug 462773 (CVE-2008-4126)

Summary: CVE-2008-4126 python-pydns uses insecure DNS source ports
Product: [Other] Security Response Reporter: Josh Bressers <bressers>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jafo
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4126
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-09-29 14:46:58 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Josh Bressers 2008-09-18 19:37:31 UTC
PyDNS (aka python-dns) before 2.3.1-5 in Debian GNU/Linux does not use
random source ports for DNS requests and does not use random
transaction IDs for DNS retries, which makes it easier for remote
attackers to spoof DNS responses, a different vulnerability than
CVE-2008-1447. NOTE: this vulnerability exists because of an
incomplete fix for CVE-2008-4099.

Comment 1 Tomas Hoger 2008-09-29 14:46:58 UTC
We currently do not ship any PyDNS version affected by the issue described in this CVE - there's either 2.3.0 in F8/F9 that is affected by the original issue (CVE-2008-4099), or 2.3.3 in Rawhide, which contains complete upstream fix.

Hence I'm closing this bug, only original issue needs to be tracked.