resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Software | From | Fixed in |
---|---|---|
ruby-lang / ruby | - | 1.8.5.x |
ruby-lang / ruby | - | 1.8.6.x |
ruby-lang / ruby | - | 1.8.7.x |
ruby-lang / ruby | - | 1.9.x |
ruby-lang / ruby | 1.6 | 1.6.x |
ruby-lang / ruby | 1.6.8 | 1.6.8.x |
ruby-lang / ruby | 1.8.0 | 1.8.0.x |
ruby-lang / ruby | 1.8.1 | 1.8.1.x |
ruby-lang / ruby | 1.8.2 | 1.8.2.x |
ruby-lang / ruby | 1.8.3 | 1.8.3.x |
ruby-lang / ruby | 1.8.4 | 1.8.4.x |
ruby-lang / ruby | 1.8.6 | 1.8.6.x |
ruby-lang / ruby | 1.8.6-p110 | 1.8.6-p110.x |
ruby-lang / ruby | 1.8.6-p111 | 1.8.6-p111.x |
ruby-lang / ruby | 1.8.6-p114 | 1.8.6-p114.x |
ruby-lang / ruby | 1.8.6-p230 | 1.8.6-p230.x |
ruby-lang / ruby | 1.8.6-p36 | 1.8.6-p36.x |
ruby-lang / ruby | 1.8.6-preview1 | 1.8.6-preview1.x |
ruby-lang / ruby | 1.8.6-preview2 | 1.8.6-preview2.x |
ruby-lang / ruby | 1.8.6-preview3 | 1.8.6-preview3.x |
ruby-lang / ruby | 1.8.7 | 1.8.7.x |
ruby-lang / ruby | 1.8.7-p17 | 1.8.7-p17.x |
ruby-lang / ruby | 1.8.7-p22 | 1.8.7-p22.x |
ruby-lang / ruby | 1.8.7-preview1 | 1.8.7-preview1.x |
ruby-lang / ruby | 1.8.7-preview2 | 1.8.7-preview2.x |
ruby-lang / ruby | 1.8.7-preview3 | 1.8.7-preview3.x |
ruby-lang / ruby | 1.8.7-preview4 | 1.8.7-preview4.x |