Description The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
CVSS vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Exploitability: 2.2 | Impact: 3.6 Attack Vector: Network
Complexity: High
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: None
Integrity: High
Availability: None
Affected Packages4 packages
🔴 Vulnerability Details6 GHSA Improper random number generation in github.com/coredns/coredns ↗ 2022-03-01 ▶ OSV Improper random number generation in github.com/coredns/coredns ↗ 2022-03-01 ▶ OSV miekg/dns insecurely generates random numbers ↗ 2021-05-18 ▶ GHSA miekg/dns insecurely generates random numbers ↗ 2021-05-18 ▶ OSV Insecure generation of random numbers in github.com/miekg/dns ↗ 2021-04-14 ▶ Show 1 more
📋 Vendor Advisories2 Red Hat golang-github-miekg-dns: predictable TXID can lead to response forgeries ↗ 2019-12-05 ▶ Debian CVE-2019-19794: golang-github-miekg-dns - The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and othe... ↗ 2019 ▶
💬 Community3 Bugzilla CVE-2019-19794 golang-github-miekg-dns: predictable TXID can lead to response forgeries ↗ 2019-12-27 ▶ Bugzilla CVE-2019-19794 golang-github-miekg-dns: predictable TXID can lead to response forgeries [fedora-all] ↗ 2019-12-27 ▶ Bugzilla CVE-2019-19794 golang-github-miekg-dns: predictable TXID can lead to response forgeries [epel-6] ↗ 2019-12-27 ▶