ID CVE-2007-3153
Summary The ares_init:randomize_key function in c-ares, on platforms other than Windows, uses a weak facility for producing a random number sequence (Unix rand), which makes it easier for remote attackers to spoof DNS responses by guessing certain values.
References
Vulnerable Configurations
  • cpe:2.3:a:daniel_stenberg:c-ares:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:daniel_stenberg:c-ares:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:daniel_stenberg:c-ares:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:daniel_stenberg:c-ares:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:daniel_stenberg:c-ares:1.2:*:*:*:*:*:*:*
    cpe:2.3:a:daniel_stenberg:c-ares:1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:daniel_stenberg:c-ares:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:daniel_stenberg:c-ares:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:daniel_stenberg:c-ares:1.3:*:*:*:*:*:*:*
    cpe:2.3:a:daniel_stenberg:c-ares:1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:daniel_stenberg:c-ares:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:daniel_stenberg:c-ares:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:daniel_stenberg:c-ares:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:daniel_stenberg:c-ares:1.3.2:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 29-07-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
bid 24386
confirm http://cool.haxx.se/cvs.cgi/curl/ares/CHANGES?rev=HEAD&content-type=text/vnd.viewcvs-markup
osvdb 37172
xf cares-aresinitrandomizekey-weak-security(34980)
Last major update 29-07-2017 - 01:32
Published 11-06-2007 - 22:30
Last modified 29-07-2017 - 01:32
Back to Top