SB2007061201 - Spoofing attack in c-ares



SB2007061201 - Spoofing attack in c-ares

Published: June 12, 2007 Updated: September 30, 2021

Security Bulletin ID SB2007061201
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Use of insufficiently random values (CVE-ID: CVE-2007-3152)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to usage of a predictable seed for the random number generator for the DNS Transaction ID field. A remote attacker can spoof DNS responses by guessing the field value.


2) Use of insufficiently random values (CVE-ID: CVE-2007-3153)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to usage of a  weak facility for producing a random number sequence (Unix rand) within the ares_init:randomize_key() function in c-ares. A remote attacker can spoof DNS responses by guessing certain value.


Remediation

Install update from vendor's website.