First published: Fri Jul 18 2008(Updated: )
PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS Recursor | =3.1.2 | |
PowerDNS Recursor | =3.0 | |
PowerDNS Recursor | =3.1.1 | |
PowerDNS Recursor | =3.0.1 | |
PowerDNS Recursor | =3.1.3 | |
PowerDNS Recursor | =3.1.4 | |
PowerDNS Recursor | <=3.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.