Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2000-0335: The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query r

0
High
VulnerabilityCVE-2000-0335cve-2000-0335
Published: Wed May 03 2000 (05/03/2000, 04:00:00 UTC)
Source: NVD
Vendor/Project: gnu
Product: glibc

Description

The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query results.

AI-Powered Analysis

AILast updated: 06/19/2025, 19:17:44 UTC

Technical Analysis

CVE-2000-0335 identifies a vulnerability in the GNU C Library (glibc) versions 2.0 through 2.1.3 and 8.2 through 8.2.2, specifically in the DNS resolver component. The resolver uses predictable transaction IDs when making DNS queries. DNS resolvers typically generate a random transaction ID to match responses with requests securely. However, in these affected versions, the predictability of these IDs allows a local attacker to spoof DNS query responses by guessing or predicting the transaction ID. This spoofing can lead to the attacker injecting malicious DNS responses, redirecting legitimate domain name resolutions to attacker-controlled IP addresses. The vulnerability affects confidentiality, integrity, and availability of network communications relying on DNS resolution. Exploitation does not require authentication but does require local access to the system to launch spoofed responses. The CVSS score of 7.5 (high severity) reflects the network attack vector, low attack complexity, no authentication required, and partial to complete impact on confidentiality, integrity, and availability. No patches are available for this vulnerability, and there are no known exploits in the wild, likely due to the age of the vulnerability and the requirement for local access. However, systems still running these legacy glibc versions remain at risk. Given the fundamental role of glibc in Linux-based systems, this vulnerability could be leveraged to redirect network traffic, perform man-in-the-middle attacks, or disrupt services relying on DNS resolution.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those running legacy Linux systems with affected glibc versions. DNS spoofing can lead to interception or redirection of sensitive communications, enabling data theft, credential compromise, or injection of malicious payloads. This undermines the confidentiality and integrity of internal and external communications. Critical infrastructure, financial institutions, and government agencies relying on vulnerable systems could face operational disruptions or data breaches. The availability of services may also be affected if DNS responses are manipulated to disrupt access to essential resources. Although exploitation requires local access, insider threats or compromised internal hosts could leverage this vulnerability to escalate attacks within organizational networks. The absence of patches means organizations must rely on alternative mitigations or system upgrades to reduce risk.

Mitigation Recommendations

Since no patches are available for the affected glibc versions, European organizations should prioritize upgrading to modern, supported glibc versions where this vulnerability is resolved. For legacy systems that cannot be immediately upgraded, implement strict access controls to limit local user privileges and prevent unauthorized local access. Employ network segmentation to isolate vulnerable systems and monitor internal traffic for anomalous DNS activity. Use DNSSEC validation on resolvers to detect and reject spoofed DNS responses. Additionally, deploying host-based intrusion detection systems (HIDS) can help identify suspicious resolver behavior. Regularly audit systems to identify any running vulnerable glibc versions and plan for phased decommissioning or upgrade. Educate system administrators about the risks of legacy software and the importance of timely updates. Finally, consider using alternative DNS resolver implementations that do not exhibit this vulnerability if upgrading glibc is not feasible in the short term.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32db6fd31d6ed7dfa87

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/19/2025, 7:17:44 PM

Last updated: 2/7/2026, 10:20:01 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats