SB2008040201 - Input validation error in PowerDNS Recursor
Published: April 2, 2008 Updated: June 21, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2008-1637)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information.
Remediation
Install update from vendor's website.
References
- http://doc.powerdns.com/changelog.html
- http://doc.powerdns.com/powerdns-advisory-2008-01.html
- http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html
- http://secunia.com/advisories/29584
- http://secunia.com/advisories/29737
- http://secunia.com/advisories/29764
- http://secunia.com/advisories/29830
- http://secunia.com/advisories/30581
- http://security.gentoo.org/glsa/glsa-200804-22.xml
- http://www.debian.org/security/2008/dsa-1544
- http://www.securityfocus.com/archive/1/490330/100/0/threaded
- http://www.securityfocus.com/bid/28517
- http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf
- http://www.trusteer.com/docs/powerdnsrecursor.html
- http://www.vupen.com/english/advisories/2008/1046/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41534
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00198.html
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00224.html