Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Denial of Service >> Multiple Vendor DNS Response Flooding Denial Of Service


Vulnerability Assessment Details

Multiple Vendor DNS Response Flooding Denial Of Service

Vulnerability Assessment Summary
send malformed DNS query on port 53

Detailed Explanation for this Vulnerability Assessment

Multiple DNS vendors are reported susceptible to a denial of service
vulnerability (Axis Communication, dnrd, Don Moore, Posadis).

This vulnerability results in vulnerable DNS servers entering into an infinite
query and response message loop, leading to the consumption of network and
CPU resources, and denying DNS service to legitimate users.

A possible hacker may exploit this flaw by finding two vulnerable servers and
set up a 'ping-pong' attack between the two hosts.

Solution : http://www.uniras.gov.uk/vuls/2004/758884/index.htm
Network Security Threat Level: Medium

Networks Security ID: 11642

Vulnerability Assessment Copyright: This script is (C)2004 Cedric Tissieres, Objectif Securite

Cables, Connectors

Lenovo ThinkPad P1 20MD0022US 15.6" LCD Mobile Workstation - Intel Core i7 (8th
$2624.09
Lenovo ThinkPad P1 20MD0022US 15.6Lenovo ThinkPad T440s 14" Laptop Core i7-4600U 2.10GHz 8GB RAM 500GB HDD Tested
$39.99
Lenovo ThinkPad T440s 14Alienware 15R3 15.6" Gaming Laptop Intel Core i5-7300 2.5GHz 8GB GTX 1050TI
$1499.71
Alienware 15R3 15.6Apple MacBook Air Early 2015 - MJVE2LL/A - Core i5 1.6 GHz - 8 GB-RAM - 256 GB-H
$649.6
Apple MacBook Air Early 2015 - MJVE2LL/A - Core i5 1.6 GHz - 8 GB-RAM - 256 GB-H picture


Discussions

No Discussions have been posted on this vulnerability.