Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2008-4100

GNU adns 1.4 and earlier uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: the vendor reports that this is intended behavior and is compatible with the product's intended role in a trusted environment.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 64.7%
CVSS Severity
CVSS v2 Score 6.4
Products affected by CVE-2008-4100
  • Gnu » Adns » Version: Any
    cpe:2.3:a:gnu:adns:*
  • Gnu » Adns » Version: 0.1
    cpe:2.3:a:gnu:adns:0.1
  • Gnu » Adns » Version: 0.2
    cpe:2.3:a:gnu:adns:0.2
  • Gnu » Adns » Version: 0.3
    cpe:2.3:a:gnu:adns:0.3
  • Gnu » Adns » Version: 0.4
    cpe:2.3:a:gnu:adns:0.4
  • Gnu » Adns » Version: 0.5
    cpe:2.3:a:gnu:adns:0.5
  • Gnu » Adns » Version: 0.6
    cpe:2.3:a:gnu:adns:0.6
  • Gnu » Adns » Version: 0.7
    cpe:2.3:a:gnu:adns:0.7
  • Gnu » Adns » Version: 0.8
    cpe:2.3:a:gnu:adns:0.8
  • Gnu » Adns » Version: 0.9
    cpe:2.3:a:gnu:adns:0.9
  • Gnu » Adns » Version: 1.0
    cpe:2.3:a:gnu:adns:1.0
  • Gnu » Adns » Version: 1.1
    cpe:2.3:a:gnu:adns:1.1
  • Gnu » Adns » Version: 1.2
    cpe:2.3:a:gnu:adns:1.2
  • Gnu » Adns » Version: 1.3
    cpe:2.3:a:gnu:adns:1.3


Contact Us

Shodan ® - All rights reserved