c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/34979 | vdb entry |
http://osvdb.org/37171 | vdb entry |
http://secunia.com/advisories/25579 | third party advisory patch vendor advisory |
http://cool.haxx.se/cvs.cgi/curl/ares/CHANGES?rev=HEAD&content-type=text/vnd.viewcvs-markup | |
http://www.securityfocus.com/bid/24386 | vdb entry patch |