CVE-2008-1637

PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 5%
VendorProductVersion
powerdnsrecursor
𝑥
≤ 3.1.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pdns-recursor
bullseye
4.4.2-3
fixed
bookworm
4.8.8-1
fixed
bookworm (security)
4.8.8-1
fixed
sid
5.0.9-1
fixed
trixie
5.0.9-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
pdns-recursor
intrepid
Fixed 3.1.4-6ubuntu1
released
hardy
Fixed 3.1.4-6ubuntu1
released
gutsy
ignored
feisty
ignored
edgy
ignored
dapper
dne
Common Weakness Enumeration
References