Vulnerabilities > CVE-2022-34294 - Insufficient Entropy vulnerability in Totd Project Totd 1.5.3
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
totd 1.5.3 uses a fixed UDP source port in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
References
- https://github.com/fwdillema/totd
- https://github.com/fwdillema/totd
- https://www.blackhat.com/presentations/bh-jp-08/bh-jp-08-Kaminsky/BlackHat-Japan-08-Kaminsky-DNS08-BlackOps.pdf
- https://www.blackhat.com/presentations/bh-jp-08/bh-jp-08-Kaminsky/BlackHat-Japan-08-Kaminsky-DNS08-BlackOps.pdf
- https://www.openwall.com/lists/oss-security/2022/08/14/2
- https://www.openwall.com/lists/oss-security/2022/08/14/2
- https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner
- https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner