Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 1544-1 (pdns-recursor)

Information

Severity

Severity

Medium

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

6.8

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

16 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to pdns-recursor announced via advisory DSA 1544-1.

Insight

Insight

Amit Klein discovered that pdns-recursor, a caching DNS resolver, uses a weak random number generator to create DNS transaction IDs and UDP source port numbers. As a result, cache poisoning attacks were simplified. (CVE-2008-1637) For the stable distribution (etch), these problems have been fixed in version 3.1.4-1+etch1. For the unstable distribution (sid), these problems have been fixed in version 3.1.5-1. We recommend that you upgrade your pdns-recursor package.

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201544-1

Common Vulnerabilities and Exposures (CVE)