First published: Fri Jul 18 2008(Updated: )
PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS | <=3.1.5 | |
PowerDNS | =3.0 | |
PowerDNS | =3.0.1 | |
PowerDNS | =3.1.1 | |
PowerDNS | =3.1.2 | |
PowerDNS | =3.1.3 | |
PowerDNS | =3.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3217 has a medium severity rating due to the potential for remote attacks leading to DNS cache poisoning.
To fix CVE-2008-3217, upgrade PowerDNS Recursor to version 3.1.6 or later, which incorporates better random number generation.
CVE-2008-3217 affects PowerDNS Recursor versions prior to 3.1.6 including 3.1.5 and earlier.
Exploiting CVE-2008-3217 could allow attackers to conduct DNS cache poisoning, leading to potential redirection of users to malicious sites.
CVE-2008-3217 is mostly relevant for older installations of PowerDNS, as newer versions have addressed the issue.