PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-1-6 - | |
References | () http://secunia.com/advisories/31311 - | |
References | () http://wiki.powerdns.com/cgi-bin/trac.fcgi/changeset/1179 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2008/07/09/10 - | |
References | () http://www.openwall.com/lists/oss-security/2008/07/10/6 - | |
References | () http://www.openwall.com/lists/oss-security/2008/07/16/12 - | |
References | () http://www.securityfocus.com/bid/30782 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/43925 - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01353.html - |
Information
Published : 2008-07-18 16:41
Updated : 2024-11-21 00:48
NVD link : CVE-2008-3217
Mitre link : CVE-2008-3217
CVE.ORG link : CVE-2008-3217
JSON object : View
Products Affected
powerdns
- recursor
CWE
CWE-189
Numeric Errors