[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1623 dnsmasq -- DNS cache poisoning

ID: oval:org.mitre.oval:def:7531Date: (C)2009-12-15   (M)2023-12-07
Class: PATCHFamily: unix




Dan Kaminsky discovered that properties inherent to the DNS protocol lead to practical DNS cache poisoning attacks. Among other things, successful attacks can lead to misdirected web traffic and email rerouting. This update changes Debian's dnsmasq packages to implement the recommended countermeasure: UDP query source port randomization. This change increases the size of the space from which an attacker has to guess values in a backwards-compatible fashion and makes successful attacks significantly more difficult. This update also switches the random number generator to Dan Bernstein's SURF.

Platform:
Debian 4.0
Product:
dnsmasq
Reference:
DSA-1623
CVE-2008-1447
CVE    1
CVE-2008-1447
CPE    1
cpe:/o:debian:debian_linux:4.x

© SecPod Technologies