Security News > 2020 > November > DNS cache poisoning attacks return due to Linux weakness
Researchers from Tsinghua University and the University of California have identified a new method that can be used to conduct DNS cache poisoning attacks.
DNS cache poisoning attacks refer to polluting this very cache existing on intermediary servers.
To prevent DNS cache poisoning attacks source port randomization had been implemented.
With the source port being out of the bag, it becomes once again possible to conduct Kaminsky's DNS cache poisoning attacks by guessing the transaction IDs as described above.
The 2020 DNS cache poisoning vulnerability impacting multiple DNS resolves has been nicknamed SAD DNS and assigned CVE-2020-25705.
News URL
Related news
- WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks (source)
- New scanner finds Linux, UNIX servers exposed to CUPS RCE attacks (source)
- Windows infected with backdoored Linux VMs in new phishing attacks (source)
- Cybercriminals hijack DNS to build stealth attack networks (source)
- New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-11-17 | CVE-2020-25705 | Use of Insufficiently Random Values vulnerability in multiple products A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. | 7.4 |