-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Package: udns
Subject: udns: Transaction ID and Source Port not random enough
Version: 0.0.9-2
Severity: grave
Tags: security

Consecutive queries use the same initial fixed random port and
consecutive transaction IDs. This allow exploits using spoofing, as
described in CVE-2008-1447, related to bind and others.

- - - -- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.26 (PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkiVw9MACgkQyTpryRcqtS0pYQCcDee7Sb4lk/Q+EPnlbh6ZE6eR
qAUAoIK5L3GexOc5NUXGHhmrsDjge9Nn
=8APJ
-----END PGP SIGNATURE-----



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to