Bug 462773 (CVE-2008-4126) - CVE-2008-4126 python-pydns uses insecure DNS source ports
Summary: CVE-2008-4126 python-pydns uses insecure DNS source ports
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2008-4126
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://nvd.nist.gov/nvd.cfm?cvename=C...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-09-18 19:37 UTC by Josh Bressers
Modified: 2019-09-29 12:26 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2008-09-29 14:46:58 UTC
Embargoed:


Attachments (Terms of Use)

Description Josh Bressers 2008-09-18 19:37:31 UTC
PyDNS (aka python-dns) before 2.3.1-5 in Debian GNU/Linux does not use
random source ports for DNS requests and does not use random
transaction IDs for DNS retries, which makes it easier for remote
attackers to spoof DNS responses, a different vulnerability than
CVE-2008-1447. NOTE: this vulnerability exists because of an
incomplete fix for CVE-2008-4099.

Comment 1 Tomas Hoger 2008-09-29 14:46:58 UTC
We currently do not ship any PyDNS version affected by the issue described in this CVE - there's either 2.3.0 in F8/F9 that is affected by the original issue (CVE-2008-4099), or 2.3.3 in Rawhide, which contains complete upstream fix.

Hence I'm closing this bug, only original issue needs to be tracked.


Note You need to log in before you can comment on or make changes to this bug.