Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2008-3217


PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.


Published

2008-07-18T16:41:00.000

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.8 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-189

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application powerdns recursor ≤ 3.1.5 Yes
Application powerdns recursor 3.0 Yes
Application powerdns recursor 3.0.1 Yes
Application powerdns recursor 3.1.1 Yes
Application powerdns recursor 3.1.2 Yes
Application powerdns recursor 3.1.3 Yes
Application powerdns recursor 3.1.4 Yes

References