Vulnerability Details CVE-2008-4099
PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.007
EPSS Ranking 71.8%
CVSS Severity
CVSS v2 Score 6.4
Products affected by CVE-2008-4099
-
cpe:2.3:a:debian:linux:unknown
-
cpe:2.3:a:debian:python-dns:*
-
cpe:2.3:a:debian:python-dns:2.3.0-1
-
cpe:2.3:a:debian:python-dns:2.3.0-2
-
cpe:2.3:a:debian:python-dns:2.3.0-3
-
cpe:2.3:a:debian:python-dns:2.3.0-4
-
cpe:2.3:a:debian:python-dns:2.3.0-5
-
cpe:2.3:a:debian:python-dns:2.3.0-5.1
-
cpe:2.3:a:debian:python-dns:2.3.0-6
-
cpe:2.3:a:debian:python-dns:2.3.1-1
-
cpe:2.3:a:debian:python-dns:2.3.1-2