Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 233217 - dev-python/pydns < 2.3.2 DNS cache poisoning (CVE-2008-1447)
Summary: dev-python/pydns < 2.3.2 DNS cache poisoning (CVE-2008-1447)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High trivial (vote)
Assignee: Gentoo Security
URL: http://sourceforge.net/project/showno...
Whiteboard: ~3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2008-07-29 02:43 UTC by Robert Buchholz (RETIRED)
Modified: 2008-09-12 14:00 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2008-07-29 02:43:17 UTC
CVE-2008-1447 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1447):
  The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1,
  9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and
  SP3, and Server 2003 SP1 and SP2; and other implementations allow remote
  attackers to spoof DNS traffic via certain cache poisoning techniques against
  recursive resolvers, related to insufficient randomness of DNS transaction
  IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability."
Comment 1 Robert Buchholz (RETIRED) gentoo-dev 2008-07-29 02:45:32 UTC
Upstream writes:
Most use cases for pydns are unaffected by the recently publicized DNS spoofing attack, because pydns only knows how to talk to a local nameserver (localhost, LAN, or ISP). It doesn't even know how to do a full query starting with the root nameservers. But, just in case someone wants to add the features needed for a caching nameserver, we now do port randomization just like bind. As before, the python-pydns packages match the system python version. The pydns packages use an arbitrary python version (2.4 by default). 
Comment 2 Stefan Briesenick (RETIRED) gentoo-dev 2008-09-12 13:55:28 UTC
version 2.3.3 in CVS.
Comment 3 Stefan Briesenick (RETIRED) gentoo-dev 2008-09-12 13:57:36 UTC
sorry for closing. ;)

security herd should decide what to do with this bug now.
Comment 4 Pierre-Yves Rofes (RETIRED) gentoo-dev 2008-09-12 14:00:19 UTC
(In reply to comment #3)
> sorry for closing. ;)
> 
> security herd should decide what to do with this bug now.

No problem here, since it has no stable keywords, it may be closed directly.