Bug 462773 - (CVE-2008-4126) CVE-2008-4126 python-pydns uses insecure DNS source ports
CVE-2008-4126 python-pydns uses insecure DNS source ports
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
http://nvd.nist.gov/nvd.cfm?cvename=C...
impact=moderate,source=internet,repor...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2008-09-18 15:37 EDT by Josh Bressers
Modified: 2008-09-29 10:46 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2008-09-29 10:46:58 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Josh Bressers 2008-09-18 15:37:31 EDT
PyDNS (aka python-dns) before 2.3.1-5 in Debian GNU/Linux does not use
random source ports for DNS requests and does not use random
transaction IDs for DNS retries, which makes it easier for remote
attackers to spoof DNS responses, a different vulnerability than
CVE-2008-1447. NOTE: this vulnerability exists because of an
incomplete fix for CVE-2008-4099.
Comment 1 Tomas Hoger 2008-09-29 10:46:58 EDT
We currently do not ship any PyDNS version affected by the issue described in this CVE - there's either 2.3.0 in F8/F9 that is affected by the original issue (CVE-2008-4099), or 2.3.3 in Rawhide, which contains complete upstream fix.

Hence I'm closing this bug, only original issue needs to be tracked.

Note You need to log in before you can comment on or make changes to this bug.