CVE-2007-3153

The ares_init:randomize_key function in c-ares, on platforms other than Windows, uses a weak facility for producing a random number sequence (Unix rand), which makes it easier for remote attackers to spoof DNS responses by guessing certain values.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:daniel_stenberg:c-ares:1.0:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.1:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.2:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.3:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:daniel_stenberg:c-ares:1.3.2:*:*:*:*:*:*:*

History

No history.

Information

Published : 2007-06-11 22:30

Updated : 2017-07-29 01:32


NVD link : CVE-2007-3153

Mitre link : CVE-2007-3153

CVE.ORG link : CVE-2007-3153


JSON object : View

Products Affected

daniel_stenberg

  • c-ares