CVE-2008-3217

PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning.  NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
VendorProductVersion
powerdnsrecursor
𝑥
≤ 3.1.5
powerdnsrecursor
3.0
powerdnsrecursor
3.0.1
powerdnsrecursor
3.1.1
powerdnsrecursor
3.1.2
powerdnsrecursor
3.1.3
powerdnsrecursor
3.1.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pdns-recursor
bullseye
4.4.2-3
fixed
bookworm
4.8.8-1
fixed
bookworm (security)
4.8.8-1
fixed
sid
5.0.9-1
fixed
trixie
5.0.9-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
pdns-recursor
oneiric
not-affected
natty
not-affected
maverick
not-affected
lucid
not-affected
karmic
not-affected
jaunty
not-affected
intrepid
not-affected
hardy
ignored
gutsy
ignored
feisty
ignored
dapper
dne
Common Weakness Enumeration