Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-1637

Overview

Vulnerability Score 6.8 6.8
CVE Id CVE-2008-1637
Last Modified 07 Mar 2011 10:07:23
Published 02 Apr 2008 01:44:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2008-1637

Summary

PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information.

Vulnerable Systems

Application

  • Powerdns Recursor 3.1.4


References

CONFIRM - http://doc.powerdns.com/powerdns-advisory-2008-01.html

FEDORA - FEDORA-2008-3036

FEDORA - FEDORA-2008-3010

XF - powerdns-dnscache-weak-security(41534)

VUPEN - ADV-2008-1046

MISC - http://www.trusteer.com/docs/powerdnsrecursor.html

MISC - http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf

BID - 28517

BUGTRAQ - 20080331 Paper by Amit Klein (Trusteer): "PowerDNS Recursor DNS Cache Poisoning [pharming]"

DEBIAN - DSA-1544

GENTOO - GLSA-200804-22

SECUNIA - 30581

SECUNIA - 29830

SECUNIA - 29764

SECUNIA - 29737

SECUNIA - 29584

SUSE - SUSE-SR:2008:012

CONFIRM - http://doc.powerdns.com/changelog.html


Last Updated: 27 May 2016 10:47:36