PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information.
References
Configurations
History
No history.
Information
Published : 2008-04-02 17:44
Updated : 2024-02-28 11:21
NVD link : CVE-2008-1637
Mitre link : CVE-2008-1637
CVE.ORG link : CVE-2008-1637
JSON object : View
Products Affected
powerdns
- recursor
CWE
CWE-189
Numeric Errors