Debian DSA-1628-1 : pdns - DNS response spoofing

medium Nessus Plugin ID 33933


The remote Debian host is missing a security-related update.


Brian Dowling discovered that the PowerDNS authoritative name server does not respond to DNS queries which contain certain characters, increasing the risk of successful DNS spoofing (CVE-2008-3337 ). This update changes PowerDNS to respond with SERVFAIL responses instead.


Upgrade the pdns package.

For the stable distribution (etch), this problem has been fixed in version 2.9.20-8+etch1.

See Also

Plugin Details

Severity: Medium

ID: 33933

File Name: debian_DSA-1628.nasl

Version: 1.14

Type: local

Agent: unix

Published: 8/19/2008

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information


Risk Factor: Medium

Score: 4.2


Risk Factor: Medium

Base Score: 6.4

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:pdns, cpe:/o:debian:debian_linux:4.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 8/10/2008

Reference Information

CVE: CVE-2008-3337

BID: 30587

CWE: 20

DSA: 1628