Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2007-3152
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
C-Ares DNS库远程缓存破坏漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
c-ares是用于异步执行DNS请求和名称解析的C库。 c-ares在生成请求字段值的方式上存在漏洞,远程攻击者可能利用此漏洞破坏DNS缓存。 c-ares库的实现所使用的DNS "Transaction ID"字段基于伪随机数,随连续调用而递增,因此是可预测的。如果用户猜测到了有效的ID,就可能破坏使用c-ares库的应用程序的DNS缓存,执行中间人攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2007-3152
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2007-3152
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2007-3152

No comments yet


Leave a comment