SUSE Linux Information for VU#800113
Multiple DNS implementations vulnerable to cache poisoning
- Vendor Information Help Date Notified: 05 May 2008
- Statement Date: 11 Jul 2008
- Date Updated: 11 Jul 2008
Status
Affected
Vendor Statement
SUSE Linux products include bind, powerdns-recursor and dnsmasq
as name servers.
An update for bind is available as online update since 2008-07-10
and we posted the SUSE-SA:2008:033 advisory to:
http://www.novell.com/linux/security/advisories/2008_33_bind.html
The last powerdns-recursor security update from May also added
random UDP source-ports which should make it not vulnerable to the
new attack Dan Kaminsky found.
The DNS forwarder dnsmasq does not emit recursive queries and
is therefore not vulnerable as far as we know. Additionally
dnsmasq will be fixed to use a CPRNG for generating the TRXID
and the UDP source-port.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Vendor References
None
Addendum
There are no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.