DescriptionPowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
SUSE Security Advisories:
- SUSE-SR:2008:012, published Fri, 06 Jun 2008 16:00:00 +0000
SUSE Timeline for this CVECVE page created: Fri Jun 28 03:38:16 2013
CVE page last modified: Fri Oct 7 12:45:40 2022