The DNS resolver in unspecified versions of Fujitsu UXP/V, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Nov 2024, 23:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.imconf.net/imw-2002/imw2002-papers/198.pdf - | |
References | () http://www.kb.cert.org/vuls/id/457875 - US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/IAFY-5FDT5K - | |
References | () http://www.rnp.br/cais/alertas/2002/cais-ALR-19112002a.html - Patch |
Information
Published : 2002-12-31 05:00
Updated : 2024-11-20 23:43
NVD link : CVE-2002-2212
Mitre link : CVE-2002-2212
CVE.ORG link : CVE-2002-2212
JSON object : View
Products Affected
isc
- bind
fujitsu
- uxp_v
CWE