Subject: c-ares DNS Cache Poisoning Vulnerability

c-ares DNS Cache Poisoning Vulnerability

From: Daniel Stenberg <daniel_at_haxx.se>
Date: Mon, 11 Jun 2007 15:58:41 +0200 (CEST)

FYI, this is what secunia.com writes on this URL:

         http://secunia.com/advisories/25579/

Description:
A vulnerability has been reported in c-ares, which can be exploited by
malicious people to poison the DNS cache.

The vulnerability is caused due to predictable DNS "Transaction ID" field in
DNS queries and can be exploited to poison the DNS cache of an application
using the library if a valid ID is guessed.

The vulnerability is reported in versions prior to 1.4.0.

-- 
   c-ares -- my preferred DNS asynch resolver library
Received on 2007-06-11