{
  "modified": "2025-08-09T19:01:26Z",
  "published": "2008-09-18T17:59:32Z",
  "id": "CVE-2008-4100",
  "details": "GNU adns 1.4 and earlier uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.  NOTE: the vendor reports that this is intended behavior and is compatible with the product's intended role in a trusted environment.",
  "references": [
    {
      "type": "WEB",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698"
    },
    {
      "type": "WEB",
      "url": "http://www.openwall.com/lists/oss-security/2008/09/11/1"
    },
    {
      "type": "WEB",
      "url": "http://www.openwall.com/lists/oss-security/2008/09/16/4"
    },
    {
      "type": "WEB",
      "url": "https://www.exploit-db.com/exploits/6197"
    }
  ]
}
