PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01353.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/43925
http://www.securityfocus.com/bid/30782
http://www.openwall.com/lists/oss-security/2008/07/16/12
http://www.openwall.com/lists/oss-security/2008/07/10/6
http://www.openwall.com/lists/oss-security/2008/07/09/10
http://wiki.powerdns.com/cgi-bin/trac.fcgi/changeset/1179
http://secunia.com/advisories/31311
http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-1-6