GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Fri Apr 18, 2008 4:26 pm Post subject: [ GLSA 200804-22 ] PowerDNS Recursor: DNS Cache Poisoning |
|
|
Gentoo Linux Security Advisory
Title: PowerDNS Recursor: DNS Cache Poisoning (GLSA 200804-22)
Severity: normal
Exploitable: remote
Date: April 18, 2008
Updated: August 21, 2008
Bug(s): #215567, #231335
ID: 200804-22
Synopsis
Use of insufficient randomness in PowerDNS Recursor might lead to DNS cache poisoning.
Background
The PowerDNS Recursor is an advanced recursing nameserver.
Affected Packages
Package: net-dns/pdns-recursor
Vulnerable: < 3.1.6
Unaffected: >= 3.1.6
Architectures: All supported architectures
Description
Amit Klein of Trusteer reported that insufficient randomness is used to calculate the TRXID values and the UDP source port numbers (CVE-2008-1637). Thomas Biege of SUSE pointed out that a prior fix to resolve this issue was incomplete, as it did not always enable the stronger random number generator for source port selection (CVE-2008-3217).
Impact
A remote attacker could send malicious answers to insert arbitrary DNS data into the cache. These attacks would in turn help an attacker to perform man-in-the-middle and site impersonation attacks.
Workaround
There is no known workaround at this time.
Resolution
All PowerDNS Recursor users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/pdns-recursor-3.1.6" |
References
CVE-2008-1637
CVE-2008-3217
Last edited by GLSA on Fri Aug 22, 2008 4:19 am; edited 1 time in total |
|