Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2008-4099

Published: 18 September 2008

PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.

Notes

AuthorNote
kees
This issue may have already been solved with other uploads.

Priority

Low

Status

Package Release Status
python-dns
Launchpad, Ubuntu, Debian
dapper Ignored
(end of life)
feisty Ignored
(end of life, was needs-triage)
gutsy Ignored
(end of life, was needs-triage)
hardy Ignored
(end of life)
intrepid Not vulnerable
(2.3.3-2)
jaunty Not vulnerable
(2.3.3-2)
karmic Not vulnerable
(2.3.3-2)
lucid Not vulnerable
(2.3.3-2)
maverick Not vulnerable
(2.3.3-2)
natty Not vulnerable
(2.3.3-2)
oneiric Not vulnerable
(2.3.3-2)
upstream
Released (2.3.1-5)