GLSA-200804-22 : PowerDNS Recursor: DNS Cache Poisoning

medium Nessus Plugin ID 32015

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200804-22 (PowerDNS Recursor: DNS Cache Poisoning)

Amit Klein of Trusteer reported that insufficient randomness is used to calculate the TRXID values and the UDP source port numbers (CVE-2008-1637). Thomas Biege of SUSE pointed out that a prior fix to resolve this issue was incomplete, as it did not always enable the stronger random number generator for source port selection (CVE-2008-3217).
Impact :

A remote attacker could send malicious answers to insert arbitrary DNS data into the cache. These attacks would in turn help an attacker to perform man-in-the-middle and site impersonation attacks.
Workaround :

There is no known workaround at this time.

Solution

All PowerDNS Recursor users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-dns/pdns-recursor-3.1.6'

See Also

https://security.gentoo.org/glsa/200804-22

Plugin Details

Severity: Medium

ID: 32015

File Name: gentoo_GLSA-200804-22.nasl

Version: 1.14

Type: local

Published: 4/22/2008

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:pdns-recursor, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 4/18/2008

Reference Information

CVE: CVE-2008-1637, CVE-2008-3217

CWE: 189

GLSA: 200804-22