Описание
totd 1.5.3 uses a fixed UDP source port in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks.
totd 1.5.3 uses a fixed UDP source port in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2022-34294
- https://github.com/fwdillema/totd
- https://www.blackhat.com/presentations/bh-jp-08/bh-jp-08-Kaminsky/BlackHat-Japan-08-Kaminsky-DNS08-BlackOps.pdf
- https://www.openwall.com/lists/oss-security/2022/08/14/2
- https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner
Связанные уязвимости
CVSS3: 9.8
nvd
больше 3 лет назад
totd 1.5.3 uses a fixed UDP source port in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks.