D.j.bernstein » Djbdns : Security Vulnerabilities
The resolver in dnscache in Daniel J. Bernstein djbdns 1.05 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a "ghost domain names" attack.
Max Base Score
6.4
Published
2012-02-17
Updated
2012-02-20
EPSS
0.35%
The response_addname function in response.c in Daniel J. Bernstein djbdns 1.05 and earlier does not constrain offsets in the required manner, which allows remote attackers, with control over a third-party subdomain served by tinydns and axfrdns, to trigger DNS responses containing arbitrary records via crafted zone data for this subdomain.
Max Base Score
5.8
Published
2009-03-09
Updated
2018-10-10
EPSS
2.92%
dnscache in Daniel J. Bernstein djbdns 1.05 does not prevent simultaneous identical outbound DNS queries, which makes it easier for remote attackers to spoof DNS responses, as demonstrated by a spoofed A record in the Additional section of a response to a Start of Authority (SOA) query.
Max Base Score
6.4
Published
2009-02-19
Updated
2017-08-08
EPSS
0.58%
3 vulnerabilities found