Security News > 2020 > November > DNS cache poisoning attacks return due to Linux weakness
Researchers from Tsinghua University and the University of California have identified a new method that can be used to conduct DNS cache poisoning attacks.
DNS cache poisoning attacks refer to polluting this very cache existing on intermediary servers.
To prevent DNS cache poisoning attacks source port randomization had been implemented.
With the source port being out of the bag, it becomes once again possible to conduct Kaminsky's DNS cache poisoning attacks by guessing the transaction IDs as described above.
The 2020 DNS cache poisoning vulnerability impacting multiple DNS resolves has been nicknamed SAD DNS and assigned CVE-2020-25705.
News URL
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-11-17 | CVE-2020-25705 | A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. | 7.4 |