{"id":"CVE-2008-1637","details":"PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information.","modified":"2025-08-09T19:01:28Z","published":"2008-04-02T17:44:00Z","references":[{"type":"EVIDENCE","url":"http://secunia.com/advisories/29584"},{"type":"ADVISORY","url":"http://secunia.com/advisories/29737"},{"type":"ADVISORY","url":"http://secunia.com/advisories/29764"},{"type":"ADVISORY","url":"http://secunia.com/advisories/29830"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30581"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200804-22.xml"},{"type":"ADVISORY","url":"http://www.debian.org/security/2008/dsa-1544"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/1046/references"},{"type":"FIX","url":"http://doc.powerdns.com/powerdns-advisory-2008-01.html"},{"type":"EVIDENCE","url":"http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf"},{"type":"EVIDENCE","url":"http://www.trusteer.com/docs/powerdnsrecursor.html"},{"type":"WEB","url":"http://doc.powerdns.com/changelog.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/490330/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/bid/28517"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41534"},{"type":"WEB","url":"https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00198.html"},{"type":"WEB","url":"https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00224.html"}],"schema_version":"1.7.3"}