MadHag
Verified User
Is this a Debian or an DA issue?
David
Synopsis :
The remote name resolver (or the server it uses upstream) may be vulnerable
to DNS cache poisoning.
Description :
The remote DNS resolver does not use random ports when making queries to
third party DNS servers.
This problem might be exploited by an attacker to poison the remote DNS
server more easily, and therefore divert legitimate traffic to arbitrary
sites.
See also :
http://www.kb.cert.org/vuls/id/800113
Solution :
Contact your DNS server vendor for a patch
Risk factor :
High / CVSS Base Score : 9.4
(CVSS2#AV:N/AC:L/Au:N/C:N/I:C/A:C)
Plugin output :
The ports used by **.**.**.** are not random.
An attacker may spoof DNS responses.
List of used ports :
- 53
- 53
- 53
- 53
CVE : CVE-2008-1447
BID : 30131
David