dproxy-nexgen (aka dproxy nexgen) uses a static UDP source port (selected randomly only at boot time) in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks.
References
Link | Resource |
---|---|
https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner | Third Party Advisory |
https://sourceforge.net/projects/dproxy/ | Third Party Advisory |
https://www.openwall.com/lists/oss-security/2022/08/14/3 | Exploit Mailing List Third Party Advisory |
Configurations
Information
Published : 2022-08-15 06:15
Updated : 2022-08-18 09:53
NVD link : CVE-2022-33989
Mitre link : CVE-2022-33989
JSON object : View
CWE
CWE-331
Insufficient Entropy
Products Affected
dproxy-nexgen_project
- dproxy-nexgen