c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2007-06-11 15:30
Updated : 2017-07-28 18:32
NVD link : CVE-2007-3152
Mitre link : CVE-2007-3152
JSON object : View
CWE
Products Affected
daniel_stenberg
- c-ares