Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2v8f-3jfm-64p5

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.

PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.

EPSS

Процентиль: 0%
0.00004
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.

redhat
почти 18 лет назад

PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.

nvd
больше 17 лет назад

PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.

debian
больше 17 лет назад

PowerDNS Recursor before 3.1.6 does not always use the strongest rando ...

EPSS

Процентиль: 0%
0.00004
Низкий