Use of Insufficiently Random Values
CVE-2007-3377
Summary
Header.pm in Net-DNS prior to 0.60 generates predictable sequence IDs with a fixed increment and can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and SpamAssassin.
- MEDIUM
- NETWORK
- NONE
- PARTIAL
- NONE
- NONE
CWE-330 - Use of Insufficiently Random Values
The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
References
Advisory Timeline
- Published