Skip to main content

Use of Insufficiently Random Values

CVE-2007-3377

Severity Medium
Score 4.3/10

Summary

Header.pm in Net-DNS prior to 0.60 generates predictable sequence IDs with a fixed increment and can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and SpamAssassin.

  • MEDIUM
  • NETWORK
  • NONE
  • PARTIAL
  • NONE
  • NONE

CWE-330 - Use of Insufficiently Random Values

The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.

References

Advisory Timeline

  • Published