Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-tj61-mqnc-sqce
Vulnerability ID VCID-tj61-mqnc-sqce
Aliases CVE-2008-4194
Summary Two errors in pdnsd allow for Denial of Service and cache poisoning.
Status Published
Exploitability None
Weighted Severity None
Risk None
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2008-4194
https://exchange.xforce.ibmcloud.com/vulnerabilities/45594
http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
http://www.phys.uu.nl/~rombouts/pdnsd.html
http://www.vupen.com/english/advisories/2008/2582
cpe:2.3:a:pdnsd:pdnsd:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdnsd:pdnsd:*:*:*:*:*:*:*:*
cpe:2.3:a:pdnsd:pdnsd:1.1.10-par:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdnsd:pdnsd:1.1.10-par:*:*:*:*:*:*:*
cpe:2.3:a:pdnsd:pdnsd:1.1.11a-par:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdnsd:pdnsd:1.1.11a-par:*:*:*:*:*:*:*
cpe:2.3:a:pdnsd:pdnsd:1.1.11-par:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdnsd:pdnsd:1.1.11-par:*:*:*:*:*:*:*
cpe:2.3:a:pdnsd:pdnsd:1.1.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdnsd:pdnsd:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:pdnsd:pdnsd:1.1.7a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdnsd:pdnsd:1.1.7a:*:*:*:*:*:*:*
cpe:2.3:a:pdnsd:pdnsd:1.1.8b1-par4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdnsd:pdnsd:1.1.8b1-par4:*:*:*:*:*:*:*
cpe:2.3:a:pdnsd:pdnsd:1.1.8b1-par5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdnsd:pdnsd:1.1.8b1-par5:*:*:*:*:*:*:*
cpe:2.3:a:pdnsd:pdnsd:1.1.8b1-par6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdnsd:pdnsd:1.1.8b1-par6:*:*:*:*:*:*:*
cpe:2.3:a:pdnsd:pdnsd:1.1.8b1-par7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdnsd:pdnsd:1.1.8b1-par7:*:*:*:*:*:*:*
cpe:2.3:a:pdnsd:pdnsd:1.1.8b1-par8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdnsd:pdnsd:1.1.8b1-par8:*:*:*:*:*:*:*
cpe:2.3:a:pdnsd:pdnsd:1.1.9-par:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdnsd:pdnsd:1.1.9-par:*:*:*:*:*:*:*
cpe:2.3:a:pdnsd:pdnsd:1.2.1_par:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdnsd:pdnsd:1.2.1_par:*:*:*:*:*:*:*
cpe:2.3:a:pdnsd:pdnsd:1.2.4-par:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdnsd:pdnsd:1.2.4-par:*:*:*:*:*:*:*
cpe:2.3:a:pdnsd:pdnsd:1.2.5-par:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdnsd:pdnsd:1.2.5-par:*:*:*:*:*:*:*
cpe:2.3:a:pdnsd:pdnsd:1.2-par:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdnsd:pdnsd:1.2-par:*:*:*:*:*:*:*
CVE-2008-4194 https://nvd.nist.gov/vuln/detail/CVE-2008-4194
GLSA-200901-03 https://security.gentoo.org/glsa/200901-03
Data source Exploit-DB
Date added July 23, 2008
Description BIND 9.x - Remote DNS Cache Poisoning
Ransomware campaign use Known
Source publication date July 24, 2008
Exploit type remote
Platform multiple
Source update date Sept. 8, 2017
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2008-4194
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.93632
EPSS Score 0.11657
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:10:16.342271+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/200901-03 38.0.0