First published: Wed Apr 02 2008(Updated: )
PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS | <=3.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1637 has a medium severity rating due to potential DNS cache poisoning vulnerabilities.
To mitigate CVE-2008-1637, upgrade PowerDNS Recursor to version 3.1.5 or later.
Exploiting CVE-2008-1637 allows attackers to poison the DNS cache, leading to the redirection of users to malicious sites.
CVE-2008-1637 affects PowerDNS Recursor versions prior to 3.1.5.
CVE-2008-1637 is caused by insufficient randomness in TRXID values and UDP source port numbers utilized by PowerDNS.