Executive Summary

Summary
Title Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks
Informations
Name cisco-sa-20080708-dns First vendor Publication 2008-07-08
Vendor Cisco Last vendor Modification 2008-07-29
Severity (Vendor) N/A Revision 2.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple Cisco products are vulnerable to DNS cache poisoning attacks due to their use of insufficiently randomized DNS transaction IDs and UDP source ports in the DNS queries that they produce, which may allow an attacker to more easily forge DNS answers that can poison DNS caches.

To exploit this vulnerability an attacker must be able to cause a vulnerable DNS server to perform recursive DNS queries. Therefore, DNS servers that are only authoritative, or servers where recursion is not allowed, are not affected.

Cisco has released free software updates that address these vulnerabilities.

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2015-05-27 21:30:16
  • Multiple Updates
2014-02-17 10:21:53
  • Multiple Updates
2013-11-11 12:37:27
  • Multiple Updates
2013-05-11 00:42:31
  • Multiple Updates
2012-11-27 13:29:28
  • Multiple Updates