CVE-2008-4100
Publication date 18 September 2008
Last updated 24 July 2024
Ubuntu priority
GNU adns 1.4 and earlier uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: the vendor reports that this is intended behavior and is compatible with the product’s intended role in a trusted environment.
Status
Package | Ubuntu Release | Status |
---|---|---|
adns | 11.04 natty |
Not affected
|
10.10 maverick |
Not affected
|
|
10.04 LTS lucid |
Not affected
|
|
9.10 karmic |
Not affected
|
|
9.04 jaunty |
Not affected
|
|
8.10 intrepid |
Not affected
|
|
8.04 LTS hardy | Ignored end of life | |
7.10 gutsy | Ignored end of life, was needs-triage | |
7.04 feisty | Ignored end of life, was needs-triage | |
6.06 LTS dapper | Ignored end of life |