Vulnerability Name: | CVE-2008-1637 (CCN-41534) | ||||||||||||||||||||||||
Assigned: | 2008-03-31 | ||||||||||||||||||||||||
Published: | 2008-03-31 | ||||||||||||||||||||||||
Updated: | 2018-10-11 | ||||||||||||||||||||||||
Summary: | PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information. | ||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-189 | ||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2008-1637 Source: CCN Type: PowerDNS Changelog, Recursor version 3.1.5, 31st of March 2008 PowerDNS manual Source: CONFIRM Type: UNKNOWN http://doc.powerdns.com/changelog.html Source: CONFIRM Type: Exploit, Patch http://doc.powerdns.com/powerdns-advisory-2008-01.html Source: SUSE Type: UNKNOWN SUSE-SR:2008:012 Source: CCN Type: SA29584 PowerDNS Recursor DNS Cache Poisoning Vulnerability Source: SECUNIA Type: Exploit, Vendor Advisory 29584 Source: SECUNIA Type: UNKNOWN 29737 Source: SECUNIA Type: UNKNOWN 29764 Source: SECUNIA Type: UNKNOWN 29830 Source: SECUNIA Type: UNKNOWN 30581 Source: GENTOO Type: UNKNOWN GLSA-200804-22 Source: DEBIAN Type: UNKNOWN DSA-1544 Source: DEBIAN Type: DSA-1544 pdns-recursor -- design flaw Source: CCN Type: GLSA-200804-22 PowerDNS Recursor: DNS Cache Poisoning Source: CCN Type: OSVDB ID: 43905 PowerDNS Recursor DNS Predictable Transaction ID (TRXID) Cache Poisoning Weakness Source: CCN Type: PowerDNS Web site DOWNLOADS Source: BUGTRAQ Type: UNKNOWN 20080331 Paper by Amit Klein (Trusteer): "PowerDNS Recursor DNS Cache Poisoning [pharming]" Source: BID Type: UNKNOWN 28517 Source: CCN Type: BID-28517 PowerDNS Remote Cache Poisoning Vulnerability Source: MISC Type: Exploit http://www.trusteer.com/docs/powerdnsrecursor.html Source: CCN Type: Trusteer Web site PowerDNS Recursor DNS Cache Poisoning Source: MISC Type: Exploit http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf Source: VUPEN Type: UNKNOWN ADV-2008-1046 Source: XF Type: UNKNOWN powerdns-dnscache-weak-security(41534) Source: XF Type: UNKNOWN powerdns-dnscache-weak-security(41534) Source: FEDORA Type: UNKNOWN FEDORA-2008-3010 Source: FEDORA Type: UNKNOWN FEDORA-2008-3036 Source: SUSE Type: SUSE-SR:2008:012 SUSE Security Summary Report | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |