SB2007061201 - Spoofing attack in c-ares
Published: June 12, 2007 Updated: September 30, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Use of insufficiently random values (CVE-ID: CVE-2007-3152)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to usage of a predictable seed for the random number generator for the DNS Transaction ID field. A remote attacker can spoof DNS responses by guessing the field value.
2) Use of insufficiently random values (CVE-ID: CVE-2007-3153)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to usage of a weak facility for producing a random number sequence (Unix rand) within the ares_init:randomize_key() function in c-ares. A remote attacker can spoof DNS responses by guessing certain value.
Remediation
Install update from vendor's website.
References
- http://cool.haxx.se/cvs.cgi/curl/ares/CHANGES?rev=HEAD&content-type=text/vnd.viewcvs-markup
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34979
- http://cool.haxx.se/cvs.cgi/curl/ares/CHANGES?rev=HEAD&content-type=text/vnd.viewcvs-markup
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34980