[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Reliance on DNS Lookups in a Security Decision

ID: 247Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: INCOMPLETE
Abstraction Type: Variant





Description

Attackers can spoof DNS entries. Do not rely on DNS names for security.

Applicable Platforms
Language Class: All

Time Of Introduction

  • Implementation
  • Architecture and Design

Related Attack Patterns

Common Consequences

ScopeTechnical ImpactNotes
Access_Control
 
Gain privileges / assume identity
Bypass protection mechanism
 
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
Implementation
 
 Perform proper forward and reverse DNS lookups to detect DNS spoofing.
 
  

Relationships

Related CWETypeViewChain
CWE-247 ChildOf CWE-898 Category CWE-888  

Demonstrative Examples   (Details)

  1. The following code samples use a DNS lookup in order to decide whether or not an inbound request is from a trusted host. If an attacker can poison the DNS cache, they can gain trusted status. (Demonstrative Example Id DX-93)

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings
None

References:

  1. Michael Howard David LeBlanc John Viega .24 Deadly Sins of Software Security. McGraw-Hill. Section:'"Sin 15: Not Updating Easily." Page 231'. Published on 2010.
  2. Michael Howard David LeBlanc John Viega .24 Deadly Sins of Software Security. McGraw-Hill. Section:'"Sin 24: Trusting Network Name Resolution." Page 361'. Published on 2010.
  3. Mark Dowd John McDonald Justin Schuh .The Art of Software Security Assessment 1st Edition. Addison Wesley. Section:'Chapter 16, "DNS Spoofing", Page 1002.'. Published on 2006.

© SecPod Technologies