dproxy-nexgen (aka dproxy nexgen) uses a static UDP source port (selected randomly only at boot time) in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks.
References
Link | Resource |
---|---|
https://sourceforge.net/projects/dproxy/ | Third Party Advisory |
https://www.openwall.com/lists/oss-security/2022/08/14/3 | Exploit Mailing List Third Party Advisory |
https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-08-15T12:10:15
Updated: 2022-08-15T12:10:15
Reserved: 2022-06-18T00:00:00
Link: CVE-2022-33989
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-08-15T13:15:18.273
Modified: 2022-08-18T16:53:15.373
Link: CVE-2022-33989
JSON object: View
Redhat Information
No data.
CWE