Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:29221
HistoryFeb 03, 2021 - 4:30 a.m.

DNS Cache Poisoning

2021-02-0304:30:37
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
11
apport
dns cache poisoning
dnsmasq
reply query handling
network attack
rfc5452
software vulnerability

EPSS

0.001

Percentile

18.5%

apport is vulnerable to DNS cache poisoning. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query() if the reply destination address/port is one of those used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies the attributes of a query that all must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack.

EPSS

0.001

Percentile

18.5%