Security News > 2020 > November > DNS cache poisoning attacks return due to Linux weakness

DNS cache poisoning attacks return due to Linux weakness
2020-11-12 15:55

Researchers from Tsinghua University and the University of California have identified a new method that can be used to conduct DNS cache poisoning attacks.

DNS cache poisoning attacks refer to polluting this very cache existing on intermediary servers.

To prevent DNS cache poisoning attacks source port randomization had been implemented.

With the source port being out of the bag, it becomes once again possible to conduct Kaminsky's DNS cache poisoning attacks by guessing the transaction IDs as described above.

The 2020 DNS cache poisoning vulnerability impacting multiple DNS resolves has been nicknamed SAD DNS and assigned CVE-2020-25705.


News URL

https://www.bleepingcomputer.com/news/security/dns-cache-poisoning-attacks-return-due-to-linux-weakness/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2020-11-17 CVE-2020-25705 Use of Insufficiently Random Values vulnerability in multiple products
A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports.
network
high complexity
linux redhat CWE-330
7.4

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Linux 11 64 2312 1489 67 3932