DNS Cache Poisoning Vulnerability in PowerDNS Recursor by PowerDNS
CVE-2008-1637

Currently unrated

Key Information:

Vendor
Powerdns
Status
Vendor
CVE Published:
2 April 2008

Summary

The PowerDNS Recursor prior to version 3.1.5 is susceptible to a security vulnerability caused by insufficient randomness in the generation of TRXID values and UDP source port numbers. This weakness can be exploited by remote attackers to effectively poison the DNS cache. Contributing factors include algorithmic deficiencies in randomness functions, reliance on a static 32-bit seed value, and the use of the current time as the sole source of entropy, leading to predictable patterns that can be manipulated.

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.