Executive Summary
Summary | |
---|---|
Title | Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks |
Informations | |||
---|---|---|---|
Name | cisco-sa-20080708-dns | First vendor Publication | 2008-07-08 |
Vendor | Cisco | Last vendor Modification | 2008-07-29 |
Severity (Vendor) | N/A | Revision | 2.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple Cisco products are vulnerable to DNS cache poisoning attacks due to their use of insufficiently randomized DNS transaction IDs and UDP source ports in the DNS queries that they produce, which may allow an attacker to more easily forge DNS answers that can poison DNS caches. To exploit this vulnerability an attacker must be able to cause a vulnerable DNS server to perform recursive DNS queries. Therefore, DNS servers that are only authoritative, or servers where recursion is not allowed, are not affected. Cisco has released free software updates that address these vulnerabilities. |
Alert History
Date | Informations |
---|---|
2015-05-27 21:30:16 |
|
2014-02-17 10:21:53 |
|
2013-11-11 12:37:27 |
|
2013-05-11 00:42:31 |
|
2012-11-27 13:29:28 |
|