Executive Summary
Summary | |
---|---|
Title | New pdns-recursor packages fix predictable randomness |
Informations | |||
---|---|---|---|
Name | DSA-1544 | First vendor Publication | 2008-04-09 |
Vendor | Debian | Last vendor Modification | 2008-07-16 |
Severity (Vendor) | N/A | Revision | 2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Thomas Biege discovered that the upstream fix for the weak random number generator released in DSA-1544-1 was incomplete: Source port randomization did still not use difficult-to-predict random numbers. This is corrected in this security update. Here is the text of the original advisory: Amit Klein discovered that pdns-recursor, a caching DNS resolver, uses a weak random number generator to create DNS transaction IDs and UDP source port numbers. As a result, cache poisoning attacks were simplified. (CVE-2008-1637) In the light of recent DNS-related developments (documented in DSAs 1603, 1604, 1605), we recommend that this update is installed as an additional safety measure. (The lack of source port randomization was addressed in the 3.1.6 upstream version.) In addition, this update incorporates the changed IP address of L.ROOT-SERVERS.NET. For the stable distribution (etch), this problem has been fixed in version 3.1.4-1+etch2. For the unstable distribution (sid), this problem has been fixed in version 3.1.7-1. We recommend that you upgrade your pdns-recursor package. |
Original Source
Url : http://www.debian.org/security/2008/dsa-1544 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-02-17 | Name : Fedora Update for pdns-recursor FEDORA-2008-3010 File : nvt/gb_fedora_2008_3010_pdns-recursor_fc7.nasl |
2009-02-17 | Name : Fedora Update for pdns-recursor FEDORA-2008-3036 File : nvt/gb_fedora_2008_3036_pdns-recursor_fc8.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200804-22 (pdns-recursor) File : nvt/glsa_200804_22.nasl |
2008-08-15 | Name : Debian Security Advisory DSA 1544-2 (pdns-recursor) File : nvt/deb_1544_2.nasl |
2008-04-21 | Name : Debian Security Advisory DSA 1544-1 (pdns-recursor) File : nvt/deb_1544_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
43905 | PowerDNS Recursor DNS Predictable Transaction ID (TRXID) Cache Poisoning Weak... |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-08-25 | Name : The remote name server is affected by a cache poisoning vulnerability. File : pdns_recursor_cache_poisining.nasl - Type : ACT_GATHER_INFO |
2008-06-04 | Name : The remote openSUSE host is missing a security update. File : suse_pdns-5242.nasl - Type : ACT_GATHER_INFO |
2008-06-04 | Name : The remote openSUSE host is missing a security update. File : suse_pdns-recursor-5319.nasl - Type : ACT_GATHER_INFO |
2008-04-22 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200804-22.nasl - Type : ACT_GATHER_INFO |
2008-04-17 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1544.nasl - Type : ACT_GATHER_INFO |
2008-04-11 | Name : The remote Fedora host is missing a security update. File : fedora_2008-3010.nasl - Type : ACT_GATHER_INFO |
2008-04-11 | Name : The remote Fedora host is missing a security update. File : fedora_2008-3036.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:27:31 |
|