A Set of Severe Flaws Affect Popular DNSMasq DNS Forwarder

dns security

Cybersecurity researchers have uncovered multiple vulnerabilities in Dnsmasq, a popular open-source software used for caching Domain Name System (DNS) responses, thereby potentially allowing an adversary to mount DNS cache poisoning attacks and remotely execute malicious code.

The seven flaws, collectively called “DNSpooq” by Israeli research firm JSOF, echoes previously disclosed weaknesses in the DNS architecture, making Dnsmasq servers powerless against a range of attacks.

“We found that Dnsmasq is vulnerable to DNS cache poisoning attack by an off-path attacker (i.e., an attacker that does not observe the communication between the DNS forwarder and the DNS server),” the researchers noted in a report published today.

“Our attack allows for poisoning of multiple domain names at once, and is a result of several vulnerabilities found. The attack can be completed successfully under seconds or few minutes, and have no special requirements. We also found that many instances of Dnsmasq are misconfigured to listen on the WAN interface, making the attack possible directly from the Internet.”

Dnsmasq, short for DNS masquerade, is a lightweight software with DNS forwarding…

http://feedproxy.google.com/~r/TheHackersNews/~3/Sf3J0D9m78E/a-set-of-severe-flaws-affect-popular.html

Have a comment? Type it below!