Description
dproxy-nexgen (aka dproxy nexgen) uses a static UDP source port (selected randomly only at boot time) in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-37022 | dproxy-nexgen (aka dproxy nexgen) uses a static UDP source port (selected randomly only at boot time) in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T08:16:16.328Z
Reserved: 2022-06-18T00:00:00.000Z
Link: CVE-2022-33989
No data.
Status : Modified
Published: 2022-08-15T13:15:18.273
Modified: 2024-11-21T07:08:43.937
Link: CVE-2022-33989
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD