Input validation error in PowerDNS Recursor - CVE-2008-3217
Published: August 8, 2017 / Updated: June 21, 2025
PowerDNS Recursor
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.
How to mitigate CVE-2008-3217
Sources
- http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-1-6
- http://secunia.com/advisories/31311
- http://wiki.powerdns.com/cgi-bin/trac.fcgi/changeset/1179
- http://www.openwall.com/lists/oss-security/2008/07/09/10
- http://www.openwall.com/lists/oss-security/2008/07/10/6
- http://www.openwall.com/lists/oss-security/2008/07/16/12
- http://www.securityfocus.com/bid/30782
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43925
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01353.html