Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-3217

Опубликовано: 25 апр. 2008
Источник: redhat
EPSS Низкий

Описание

PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=456054pdns-recursor: not using the strongest random number generator for source port selection

EPSS

Процентиль: 0%
0.00004
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.

nvd
больше 17 лет назад

PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.

debian
больше 17 лет назад

PowerDNS Recursor before 3.1.6 does not always use the strongest rando ...

github
больше 3 лет назад

PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637.

EPSS

Процентиль: 0%
0.00004
Низкий