Description
PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1544-1 | New pdns-recursor packages fix cache poisoning vulnerability |
Debian DSA |
DSA-1544-2 | New pdns-recursor packages fix predictable randomness |
EUVD |
EUVD-2008-1638 | PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information. |
References
History
Wed, 28 May 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T08:32:01.076Z
Reserved: 2008-04-02T00:00:00.000Z
Link: CVE-2008-1637
No data.
Status : Deferred
Published: 2008-04-02T17:44:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-1637
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD