vendor:
N/A
by:
Julien Desfossez
6.8
CVSS
MEDIUM
DNS Cache Poisoning
400
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: CVE-2008-1447
CPE: N/A
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0458/, https://www.rapid7.com/db/vulnerabilities/cisco-sa-20080924-iosips/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2008-3630/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2008-3905/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2008-3905/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2008-3905/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-SUSE-SR-2008-017-vuln1/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2008-3337/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2008-3337/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cesa-2008-0533/, https://www.rapid7.com/db/vulnerabilities/vmsa-2008-0014-cve-2008-1447/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2008-1447/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0533/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0789/, https://www.rapid7.com/db/vulnerabilities/dns-kaminsky-bug-bind/, https://www.rapid7.com/db/vulnerabilities/dns-kaminsky-bug/, https://www.rapid7.com/db/vulnerabilities/juniper-junos-os-jsa10403/, https://www.rapid7.com/db/vulnerabilities/freebsd-vid-959d384d-6b59-11dd-9d79-001fc61c2a55/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2008-1447/, https://www.rapid7.com/db/vulnerabilities/apple-osx-bind-cve-2008-1447/, https://www.rapid7.com/db/?q=CVE-2008-1447&type=&page=2, https://www.rapid7.com/db/?q=CVE-2008-1447&type=&page=2
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
DNS Cache Poisoning Exploit
This script exploit the flaw discovered by Dan Kaminsky which allows an attacker to insert a dummy record in the vulnerable DNS server by guessing the transaction ID. It also inserts Authority record for a valid record of the target domain.
Mitigation:
Implement DNSSEC to prevent DNS cache poisoning attacks.