CVE Vulnerabilities

CVE-2008-3905

Improper Authentication

Published: Sep 04, 2008 | Modified: Oct 03, 2018
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5.8 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.

Weakness

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Ruby Ruby-lang 1.6 1.6
Ruby Ruby-lang 1.6.8 1.6.8
Ruby Ruby-lang 1.8.0 1.8.0
Ruby Ruby-lang 1.8.1 1.8.1
Ruby Ruby-lang 1.8.2 1.8.2
Ruby Ruby-lang 1.8.3 1.8.3
Ruby Ruby-lang 1.8.4 1.8.4
Ruby Ruby-lang * 1.8.5
Ruby Ruby-lang 1.8.6 1.8.6
Ruby Ruby-lang 1.8.6 1.8.6
Ruby Ruby-lang 1.8.6 1.8.6
Ruby Ruby-lang 1.8.6 1.8.6
Ruby Ruby-lang 1.8.6 1.8.6
Ruby Ruby-lang * 1.8.6
Ruby Ruby-lang 1.8.6 1.8.6
Ruby Ruby-lang 1.8.6 1.8.6
Ruby Ruby-lang 1.8.6 1.8.6
Ruby Ruby-lang 1.8.6 1.8.6
Ruby Ruby-lang 1.8.7 1.8.7
Ruby Ruby-lang 1.8.7 1.8.7
Ruby Ruby-lang 1.8.7 1.8.7
Ruby Ruby-lang * 1.8.7
Ruby Ruby-lang 1.8.7 1.8.7
Ruby Ruby-lang 1.8.7 1.8.7
Ruby Ruby-lang 1.8.7 1.8.7
Ruby Ruby-lang 1.8.7 1.8.7
Ruby Ruby-lang * 1.9
Red Hat Enterprise Linux 3 RedHat ruby-0:1.6.8-13.el3 *
Red Hat Enterprise Linux 4 RedHat ruby-0:1.8.1-7.el4_7.1 *
Red Hat Enterprise Linux 5 RedHat ruby-0:1.8.5-5.el5_2.5 *
Ruby1.8 Ubuntu dapper *
Ruby1.8 Ubuntu feisty *
Ruby1.8 Ubuntu gutsy *
Ruby1.8 Ubuntu hardy *
Ruby1.8 Ubuntu upstream *
Ruby1.9 Ubuntu dapper *
Ruby1.9 Ubuntu feisty *
Ruby1.9 Ubuntu gutsy *
Ruby1.9 Ubuntu hardy *
Ruby1.9 Ubuntu intrepid *
Ruby1.9 Ubuntu jaunty *
Ruby1.9 Ubuntu karmic *
Ruby1.9 Ubuntu lucid *
Ruby1.9 Ubuntu upstream *

Potential Mitigations

References