Joined: 12 May 2004
|Posted: Fri Apr 18, 2008 4:26 pm Post subject: [ GLSA 200804-22 ] PowerDNS Recursor: DNS Cache Poisoning
|Gentoo Linux Security Advisory
Title: PowerDNS Recursor: DNS Cache Poisoning (GLSA 200804-22)
Date: April 18, 2008
Updated: August 21, 2008
Bug(s): #215567, #231335
Use of insufficient randomness in PowerDNS Recursor might lead to DNS cache poisoning.
The PowerDNS Recursor is an advanced recursing nameserver.
Vulnerable: < 3.1.6
Unaffected: >= 3.1.6
Architectures: All supported architectures
Amit Klein of Trusteer reported that insufficient randomness is used to calculate the TRXID values and the UDP source port numbers (CVE-2008-1637). Thomas Biege of SUSE pointed out that a prior fix to resolve this issue was incomplete, as it did not always enable the stronger random number generator for source port selection (CVE-2008-3217).
A remote attacker could send malicious answers to insert arbitrary DNS data into the cache. These attacks would in turn help an attacker to perform man-in-the-middle and site impersonation attacks.
There is no known workaround at this time.
All PowerDNS Recursor users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/pdns-recursor-3.1.6"
Last edited by GLSA on Fri Aug 22, 2008 4:19 am; edited 1 time in total