resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ruby | Ruby-lang | 1.8.7 | 1.8.7 |
Ruby | Ruby-lang | 1.8.7 | 1.8.7 |
Ruby | Ruby-lang | 1.8.6 | 1.8.6 |
Ruby | Ruby-lang | 1.8.6 | 1.8.6 |
Ruby | Ruby-lang | * | 1.9 |
Ruby | Ruby-lang | * | 1.8.6 |
Ruby | Ruby-lang | 1.8.7 | 1.8.7 |
Ruby | Ruby-lang | 1.8.4 | 1.8.4 |
Ruby | Ruby-lang | 1.8.3 | 1.8.3 |
Ruby | Ruby-lang | * | 1.8.5 |
Ruby | Ruby-lang | 1.8.2 | 1.8.2 |
Ruby | Ruby-lang | 1.8.7 | 1.8.7 |
Ruby | Ruby-lang | 1.8.1 | 1.8.1 |
Ruby | Ruby-lang | 1.8.6 | 1.8.6 |
Ruby | Ruby-lang | 1.8.6 | 1.8.6 |
Ruby | Ruby-lang | 1.8.6 | 1.8.6 |
Ruby | Ruby-lang | 1.8.6 | 1.8.6 |
Ruby | Ruby-lang | 1.8.0 | 1.8.0 |
Ruby | Ruby-lang | 1.8.7 | 1.8.7 |
Ruby | Ruby-lang | 1.8.6 | 1.8.6 |
Ruby | Ruby-lang | * | 1.8.7 |
Ruby | Ruby-lang | 1.6.8 | 1.6.8 |
Ruby | Ruby-lang | 1.8.6 | 1.8.6 |
Ruby | Ruby-lang | 1.8.7 | 1.8.7 |
Ruby | Ruby-lang | 1.6 | 1.6 |
Ruby | Ruby-lang | 1.8.6 | 1.8.6 |
Ruby | Ruby-lang | 1.8.7 | 1.8.7 |