CVE-2007-3152

c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:daniel_stenberg:c-ares:1.0:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.1:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.2:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.3:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.3.1:*:*:*:*:*:*:*

Information

Published : 2007-06-11 15:30

Updated : 2017-07-28 18:32


NVD link : CVE-2007-3152

Mitre link : CVE-2007-3152


JSON object : View

Advertisement

dedicated server usa

Products Affected

daniel_stenberg

  • c-ares