GNU adns 1.4 and earlier uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: the vendor reports that this is intended behavior and is compatible with the products intended role in a trusted environment.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Adns | Gnu | * | 1.4 (including) | 
| Adns | Gnu | 0.1 (including) | 0.1 (including) | 
| Adns | Gnu | 0.2 (including) | 0.2 (including) | 
| Adns | Gnu | 0.3 (including) | 0.3 (including) | 
| Adns | Gnu | 0.4 (including) | 0.4 (including) | 
| Adns | Gnu | 0.5 (including) | 0.5 (including) | 
| Adns | Gnu | 0.6 (including) | 0.6 (including) | 
| Adns | Gnu | 0.7 (including) | 0.7 (including) | 
| Adns | Gnu | 0.8 (including) | 0.8 (including) | 
| Adns | Gnu | 0.9 (including) | 0.9 (including) | 
| Adns | Gnu | 1.0 (including) | 1.0 (including) | 
| Adns | Gnu | 1.1 (including) | 1.1 (including) | 
| Adns | Gnu | 1.2 (including) | 1.2 (including) | 
| Adns | Gnu | 1.3 (including) | 1.3 (including) | 
| Adns | Ubuntu | dapper | * | 
| Adns | Ubuntu | feisty | * | 
| Adns | Ubuntu | gutsy | * | 
| Adns | Ubuntu | hardy | * | 
| Adns | Ubuntu | upstream | * |