Thadeu Lima de Souza Cascardo
2008-Aug-03 14:42 UTC
[Secure-testing-team] Bug#493599: Transaction ID and Source Port not random enough
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Package: udns Subject: udns: Transaction ID and Source Port not random enough Version: 0.0.9-2 Severity: grave Tags: security Consecutive queries use the same initial fixed random port and consecutive transaction IDs. This allow exploits using spoofing, as described in CVE-2008-1447, related to bind and others. - - - -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, ''unstable''), (1, ''experimental'') Architecture: i386 (i686) Kernel: Linux 2.6.26 (PREEMPT) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkiVw9MACgkQyTpryRcqtS0pYQCcDee7Sb4lk/Q+EPnlbh6ZE6eR qAUAoIK5L3GexOc5NUXGHhmrsDjge9Nn =8APJ -----END PGP SIGNATURE-----