Debian DSA-1544-2 : pdns-recursor - design flaw

medium Nessus Plugin ID 31950

Synopsis

The remote Debian host is missing a security-related update.

Description

Amit Klein discovered that pdns-recursor, a caching DNS resolver, uses a weak random number generator to create DNS transaction IDs and UDP source port numbers. As a result, cache poisoning attacks were simplified. (CVE-2008-1637 and CVE-2008-3217 )

Solution

Upgrade the pdns-recursor package.

For the stable distribution (etch), these problems have been fixed in version 3.1.4-1+etch2.

See Also

https://security-tracker.debian.org/tracker/CVE-2008-1637

https://security-tracker.debian.org/tracker/CVE-2008-3217

https://www.debian.org/security/2008/dsa-1544

Plugin Details

Severity: Medium

ID: 31950

File Name: debian_DSA-1544.nasl

Version: 1.16

Type: local

Agent: unix

Published: 4/17/2008

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:4.0, p-cpe:/a:debian:debian_linux:pdns-recursor

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 7/16/2008

Reference Information

CVE: CVE-2008-1637, CVE-2008-3217

CWE: 189

DSA: 1544