c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.
Name | Vendor | Start Version | End Version |
---|---|---|---|
C-ares | Daniel_stenberg | 1.0 (including) | 1.0 (including) |
C-ares | Daniel_stenberg | 1.1 (including) | 1.1 (including) |
C-ares | Daniel_stenberg | 1.2 (including) | 1.2 (including) |
C-ares | Daniel_stenberg | 1.2.1 (including) | 1.2.1 (including) |
C-ares | Daniel_stenberg | 1.3 (including) | 1.3 (including) |
C-ares | Daniel_stenberg | 1.3.1 (including) | 1.3.1 (including) |
C-ares | Daniel_stenberg | 1.3.2 (including) | 1.3.2 (including) |