DNS Spoofing Risk in GNU adns Software by The GNU Project
CVE-2008-4100
Currently unrated
Summary
GNU adns versions 1.4 and earlier are susceptible to a vulnerability where a fixed source port and sequential transaction IDs are used for DNS requests. This design choice allows remote attackers to easily spoof DNS responses, posing significant security risks in untrusted environments. Although the vendor states this behavior fits the product's intended use in a trusted scope, it can expose users to potential remote exploitation if used improperly.
References
Timeline
Vulnerability published
Vulnerability Reserved