BIND 4 and BIND 8, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods.
Link | Tags |
---|---|
http://secunia.com/advisories/20217 | third party advisory vendor advisory |
http://www.imconf.net/imw-2002/imw2002-papers/198.pdf | |
http://www.securityfocus.com/archive/1/434523/100/0/threaded | vendor advisory |
http://www.kb.cert.org/vuls/id/IAFY-5FDPYP | |
http://www.kb.cert.org/vuls/id/457875 | third party advisory us government resource |
http://www.vupen.com/english/advisories/2006/1923 | vdb entry |
http://lists.apple.com/archives/Security-announce/2002/Nov/msg00000.html | vendor advisory |
http://www.kb.cert.org/vuls/id/IAFY-5FDT4U | |
http://www.kb.cert.org/vuls/id/IAFY-5FZSLQ | |
http://www.rnp.br/cais/alertas/2002/cais-ALR-19112002a.html | patch |