SB2008041801 - Gentoo update for PowerDNS Recursor



SB2008041801 - Gentoo update for PowerDNS Recursor

Published: April 18, 2008 Updated: June 28, 2025

Security Bulletin ID SB2008041801
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2008-1637)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information.


2) Input validation error (CVE-ID: CVE-2008-3217)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.


Remediation

Install update from vendor's website.