SB2008080805 - DNS cache poisoning in PowerDNS Authoritative
Published: August 8, 2008 Updated: June 21, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2008-3337)
The vulnerability allows a remote attacker to perform DNS cache poisoning.
PowerDNS Authoritative Server before 2.9.21.1 drops malformed queries, which might make it easier for remote attackers to poison DNS caches of other products running on other servers
Remediation
Install update from vendor's website.
References
- http://doc.powerdns.com/changelog.html
- http://doc.powerdns.com/powerdns-advisory-2008-02.html
- http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
- http://mailman.powerdns.com/pipermail/pdns-users/2008-August/005646.html
- http://secunia.com/advisories/31401
- http://secunia.com/advisories/31407
- http://secunia.com/advisories/31448
- http://secunia.com/advisories/31687
- http://secunia.com/advisories/33264
- http://security.gentoo.org/glsa/glsa-200812-19.xml
- http://www.securityfocus.com/bid/30587
- http://www.vupen.com/english/advisories/2008/2320
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44253
- https://www.debian.org/security/2008/dsa-1628
- https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00109.html
- https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00140.html