SB2019121320 - Use of cryptographically weak pseudo-random number generator in Miek Gieben DNS library



SB2019121320 - Use of cryptographically weak pseudo-random number generator in Miek Gieben DNS library

Published: December 13, 2019 Updated: June 28, 2024

Security Bulletin ID SB2019121320
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) (CVE-ID: CVE-2019-19794)

The vulnerability allows a remote attacker to poison DNS cache.

The vulnerability exists due to usage of predictable random numbers for TXID. A remote attacker can forge DNS responses.



Remediation

Install update from vendor's website.