CVE-2008-1637

NameCVE-2008-1637
DescriptionPowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-1544-1, DSA-1544-2
NVD severitymedium (attack range: remote)
Debian/oldoldstablenot vulnerable.
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pdns-recursor (PTS)squeeze3.2-4fixed
squeeze (lts)3.2-4+deb6u1fixed
wheezy, wheezy (security)3.3-3+deb7u1fixed
jessie (security), jessie3.6.2-2+deb8u1fixed
stretch, sid3.7.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pdns-recursorsource(unstable)3.1.7-1medium
pdns-recursorsourceetch3.1.4-1+etch2mediumDSA-1544-2

Notes

Fix in 3.1.5 was incomplete, see CVE-2008-3217

Search for package or bug name: Reporting problems