Cache poisoning vulnerability on the OS level DNS cache in Ubuntu
Bug #1782225 reported by
Fatemah Alharbi
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
dnsmasq (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | ||
systemd (Ubuntu) |
Invalid
|
Undecided
|
Unassigned |
Bug Description
We would like to report a cache poisoning vulnerability on the OS level DNS cache in Ubuntu. This vulnerability allows an off-path attacker to impersonate the DNS resolver and poisons the OS-wide DNS cache directly or through a port-preserving NAT. We have a paper describing the problem, please see the attachment.
information type: | Private Security → Public Security |
Changed in dnsmasq (Ubuntu): | |
status: | New → Confirmed |
Changed in systemd (Ubuntu): | |
status: | New → Confirmed |
To post a comment you must log in.
Not the place to report a DNS vulnerability, seems more like a PDF attack, so removing the attachment.
If this is legitimate, please submit against the DNS package in Ubuntu.