[Secure-testing-team] Bug#493599: Transaction ID and Source Port not random enough

Thadeu Lima de Souza Cascardo cascardo at minaslivre.org
Sun Aug 3 14:42:27 UTC 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Package: udns
Subject: udns: Transaction ID and Source Port not random enough
Version: 0.0.9-2
Severity: grave
Tags: security

Consecutive queries use the same initial fixed random port and
consecutive transaction IDs. This allow exploits using spoofing, as
described in CVE-2008-1447, related to bind and others.

- - - -- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.26 (PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkiVw9MACgkQyTpryRcqtS0pYQCcDee7Sb4lk/Q+EPnlbh6ZE6eR
qAUAoIK5L3GexOc5NUXGHhmrsDjge9Nn
=8APJ
-----END PGP SIGNATURE-----





More information about the Secure-testing-team mailing list