Lucene search

K
nessusTenable4601.PRM
HistoryJul 22, 2008 - 12:00 a.m.

DNS Server Source Port 53 Query Usage

2008-07-2200:00:00
Tenable
www.tenable.com
8

The remote host is running a DNS server that is configured to use port 53 as its source port for queries. This is extremely dangerous as an attacker only needs to spoof a 16-bit transaction ID in order to poison the DNS cache. A poisoned cache means that DNS clients can be directed to rogue sites and greatly simplifies phishing attacks.

Binary data 4601.prm