Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2008-1637
Description:PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information.
Test IDs: 1.3.6.1.4.1.25623.1.0.60768   1.3.6.1.4.1.25623.1.0.60822   1.3.6.1.4.1.25623.1.0.60790   1.3.6.1.4.1.25623.1.0.860381   1.3.6.1.4.1.25623.1.0.60764   1.3.6.1.4.1.25623.1.0.860380  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2008-1637
BugTraq ID: 28517
http://www.securityfocus.com/bid/28517
Bugtraq: 20080331 Paper by Amit Klein (Trusteer): "PowerDNS Recursor DNS Cache Poisoning [pharming]" (Google Search)
http://www.securityfocus.com/archive/1/490330/100/0/threaded
Debian Security Information: DSA-1544 (Google Search)
http://www.debian.org/security/2008/dsa-1544
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00198.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00224.html
http://security.gentoo.org/glsa/glsa-200804-22.xml
http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf
http://www.trusteer.com/docs/powerdnsrecursor.html
http://secunia.com/advisories/29584
http://secunia.com/advisories/29737
http://secunia.com/advisories/29764
http://secunia.com/advisories/29830
http://secunia.com/advisories/30581
SuSE Security Announcement: SUSE-SR:2008:012 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html
http://www.vupen.com/english/advisories/2008/1046/references
XForce ISS Database: powerdns-dnscache-weak-security(41534)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41534




© 1998-2025 E-Soft Inc. All rights reserved.