CVE-2008-1637

PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information.
References
Link Resource
http://doc.powerdns.com/changelog.html
http://doc.powerdns.com/powerdns-advisory-2008-01.html Exploit Patch
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html
http://secunia.com/advisories/29584 Exploit Vendor Advisory
http://secunia.com/advisories/29737
http://secunia.com/advisories/29764
http://secunia.com/advisories/29830
http://secunia.com/advisories/30581
http://security.gentoo.org/glsa/glsa-200804-22.xml
http://www.debian.org/security/2008/dsa-1544
http://www.securityfocus.com/archive/1/490330/100/0/threaded
http://www.securityfocus.com/bid/28517
http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf Exploit
http://www.trusteer.com/docs/powerdnsrecursor.html Exploit
http://www.vupen.com/english/advisories/2008/1046/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41534
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00198.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00224.html
http://doc.powerdns.com/changelog.html
http://doc.powerdns.com/powerdns-advisory-2008-01.html Exploit Patch
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html
http://secunia.com/advisories/29584 Exploit Vendor Advisory
http://secunia.com/advisories/29737
http://secunia.com/advisories/29764
http://secunia.com/advisories/29830
http://secunia.com/advisories/30581
http://security.gentoo.org/glsa/glsa-200804-22.xml
http://www.debian.org/security/2008/dsa-1544
http://www.securityfocus.com/archive/1/490330/100/0/threaded
http://www.securityfocus.com/bid/28517
http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf Exploit
http://www.trusteer.com/docs/powerdnsrecursor.html Exploit
http://www.vupen.com/english/advisories/2008/1046/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41534
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00198.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00224.html
Configurations

Configuration 1 (hide)

cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:44

Type Values Removed Values Added
References () http://doc.powerdns.com/changelog.html - () http://doc.powerdns.com/changelog.html -
References () http://doc.powerdns.com/powerdns-advisory-2008-01.html - Exploit, Patch () http://doc.powerdns.com/powerdns-advisory-2008-01.html - Exploit, Patch
References () http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html -
References () http://secunia.com/advisories/29584 - Exploit, Vendor Advisory () http://secunia.com/advisories/29584 - Exploit, Vendor Advisory
References () http://secunia.com/advisories/29737 - () http://secunia.com/advisories/29737 -
References () http://secunia.com/advisories/29764 - () http://secunia.com/advisories/29764 -
References () http://secunia.com/advisories/29830 - () http://secunia.com/advisories/29830 -
References () http://secunia.com/advisories/30581 - () http://secunia.com/advisories/30581 -
References () http://security.gentoo.org/glsa/glsa-200804-22.xml - () http://security.gentoo.org/glsa/glsa-200804-22.xml -
References () http://www.debian.org/security/2008/dsa-1544 - () http://www.debian.org/security/2008/dsa-1544 -
References () http://www.securityfocus.com/archive/1/490330/100/0/threaded - () http://www.securityfocus.com/archive/1/490330/100/0/threaded -
References () http://www.securityfocus.com/bid/28517 - () http://www.securityfocus.com/bid/28517 -
References () http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf - Exploit () http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf - Exploit
References () http://www.trusteer.com/docs/powerdnsrecursor.html - Exploit () http://www.trusteer.com/docs/powerdnsrecursor.html - Exploit
References () http://www.vupen.com/english/advisories/2008/1046/references - () http://www.vupen.com/english/advisories/2008/1046/references -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41534 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/41534 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00198.html - () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00198.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00224.html - () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00224.html -

Information

Published : 2008-04-02 17:44

Updated : 2024-11-21 00:44


NVD link : CVE-2008-1637

Mitre link : CVE-2008-1637

CVE.ORG link : CVE-2008-1637


JSON object : View

Products Affected

powerdns

  • recursor
CWE
CWE-189

Numeric Errors