Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-566q-9c9p-9jc4

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

BIND 4 and BIND 8, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods.

BIND 4 and BIND 8, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods.

EPSS

Процентиль: 87%
0.03336
Низкий

Связанные уязвимости

nvd
больше 22 лет назад

BIND 4 and BIND 8, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods.

debian
больше 22 лет назад

BIND 4 and BIND 8, when resolving recursive DNS queries for arbitrary ...

EPSS

Процентиль: 87%
0.03336
Низкий