We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.

Back to home

Cache poisoning vulnerabilities found in 2 DNS resolving apps

Source

Ars Technica

Published

TL;DR

AI Generated

Two DNS resolving apps, BIND and Unbound, are found to have cache poisoning vulnerabilities, allowing attackers to manipulate DNS caches and direct users to malicious sites. The vulnerabilities, with severity ratings of 8.6 and 5.6, are related to logic errors and weak pseudo-random number generation. Exploiting these vulnerabilities could lead to replacing valid domain lookup results with corrupted ones, potentially controlled by attackers. Patches for these vulnerabilities have been released to address the issue, reminiscent of the 2008 DNS cache poisoning attack discovered by Dan Kaminsky.