Vulnerabilities > CVE-2008-4392 - Race Condition vulnerability in D.J.Bernstein Djbdns 1.05

047910
CVSS 6.4 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
d-j-bernstein
CWE-362
nessus

Summary

dnscache in Daniel J. Bernstein djbdns 1.05 does not prevent simultaneous identical outbound DNS queries, which makes it easier for remote attackers to spoof DNS responses, as demonstrated by a spoofed A record in the Additional section of a response to a Start of Authority (SOA) query.

Vulnerable Configurations

Part Description Count
Application
D.J.Bernstein
1

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Leveraging Race Conditions
    This attack targets a race condition occurring when multiple processes access and manipulate the same resource concurrently and the outcome of the execution depends on the particular order in which the access takes place. The attacker can leverage a race condition by "running the race", modifying the resource and modifying the normal execution flow. For instance a race condition can occur while accessing a file, the attacker can trick the system by replacing the original file with his version and cause the system to read the malicious file.
  • Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
    This attack targets a race condition occurring between the time of check (state) for a resource and the time of use of a resource. The typical example is the file access. The attacker can leverage a file access race condition by "running the race", meaning that he would modify the resource between the first time the target program accesses the file and the time the target program uses the file. During that period of time, the attacker could do something such as replace the file and cause an escalation of privilege.

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2012-20959.NASL
    descriptionThis fixes two of the cache poisoning issue in the DNS resolver - dnscache. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-01-04
    plugin id63376
    published2013-01-04
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/63376
    titleFedora 16 : ndjbdns-1.05.5-1.fc16 (2012-20959)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2012-20967.NASL
    descriptionThis fixes two of the cache poisoning issue in the DNS resolver - dnscache. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-01-04
    plugin id63378
    published2013-01-04
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/63378
    titleFedora 17 : ndjbdns-1.05.5-1.fc17 (2012-20967)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2012-20923.NASL
    descriptionThis fixes two of the cache poisoning issue in the DNS resolver - dnscache. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-01-14
    plugin id63499
    published2013-01-14
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/63499
    titleFedora 18 : ndjbdns-1.05.5-1.fc18 (2012-20923)

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 33818 CVE(CAN) ID: CVE-2008-4392 djbdns是一个由Qmail的作者所设计的轻量级DNS server。 djbdns的dnscache服务组件没有正确地处理SOA记录,如果远程攻击者持续的向服务器发送大量的SOA请求和伪造回复,就会增加DNS缓存投毒攻击的成功概率。 D. J. Bernstein djbdns 1.05 厂商补丁: D. J. Bernstein --------------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href=http://www.your.org/dnscache/djbdns-1.05-with-patches.tar.gz target=_blank rel=external nofollow>http://www.your.org/dnscache/djbdns-1.05-with-patches.tar.gz</a>
idSSV:4803
last seen2017-11-19
modified2009-02-20
published2009-02-20
reporterRoot
titledjbdns dnscache SOA请求远程缓存中毒漏洞