Sponsored Content
Special Forums Cybersecurity Security Advisories (RSS) S-341: Multiple Cisco Products Vulnernable to DNS Cache Poisoning Attacks Post 302226191 by Linux Bot on Monday 18th of August 2008 12:40:06 PM
Old 08-18-2008
S-341: Multiple Cisco Products Vulnernable to DNS Cache Poisoning Attacks

Multiple Cisco products are vulnerable to DNS cache poisoning attacks due to their use of insufficiently randomized DNS transaction IDs and UDP source ports in the DNS queries that they produce, which may allow an attacker to more easily forge DNS answers that can poison DNS caches. The risk is HIGH. Successful exploitation of the vulnerability described in this document may result in invalid hostname-to-IP address mappings in the cache of an affected DNS server. This may lead of this DNS server to contact with wrong provider of network services.


More...
 

2 More Discussions You Might Find Interesting

1. IP Networking

how can we spoof ethernet by ARP cache poisoning on unix through a program

how can we spoof ethernet by ARP cache poisoning on unix through a program... can anyone post the source code to achieve this... (1 Reply)
Discussion started by: ud4u
1 Replies

2. Cybersecurity

Dns cache poisoning upgrade to bind9.5.0p2

Hi again guys, It seems this is a global thing affecting all the DNS bind versions prior to July 28 2008. I have my work cut out for me very soon, I see at least a handful of servers in my list that either need to patching or upgrading. How many of you guys are affected? Anybody successfully... (4 Replies)
Discussion started by: sparcguy
4 Replies
dnsextd(8)						    BSD System Manager's Manual 						dnsextd(8)

NAME
dnsextd -- BIND Extension Daemon SYNOPSIS
dnsextd DESCRIPTION
dnsextd is a daemon invoked at boot time, running alongside BIND 9, to implement two EDNS0 extensions to the standard DNS protocol. dnsextd allows clients to perform DNS Updates with an attached lease lifetime, so that if the client crashes or is disconnected from the net- work, its address records will be automatically deleted after the lease expires. dnsextd allows clients to perform long-lived queries. Instead of rapidly polling the server to discover when information changes, long-lived queries enable a client to indicate its interest in some set of data, and then be notified asynchronously by the server whenever any of that data changes. dnsextd has no user-specifiable command-line argument, and users should not run dnsextd manually. SEE ALSO
mDNS(1) mDNSResponder(8) For information on Dynamic DNS Update, see RFC 2136 "Dynamic Updates in the Domain Name System (DNS UPDATE)" For information on Dynamic DNS Update Leases, see http://files.dns-sd.org/draft-dns-update-leases.txt For information on Long-Lived Queries, see http://files.dns-sd.org/draft-dns-llq.txt BUGS
dnsextd bugs are tracked in Apple Radar component "mDNSResponder". HISTORY
The dnsextd daemon first appeared in Mac OS X 10.4 (Tiger). Darwin June 1, 2019 Darwin
All times are GMT -4. The time now is 05:10 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy