Vulnerability Name: | CCN-977 | ||||||
Published: | 1997-04-01 | ||||||
Updated: | 1997-04-01 | ||||||
Summary: | Nameservers that accept or return false Name Server (NS), Start of Authority (SOA), or Canonical Name (CNAME) records could allow an attacker to spoof DNS information. This allows an attacker to provide forged name services, circumvent name-based authentication (such as TCP wrappers), and redirect Web traffic. | ||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||
CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||
Vulnerability Consequences: | Bypass Security | ||||||
References: | Source: CCN Type: FTP directory /isc/bind/ at ftp.isc.org BIND Source and Documentation Source: CCN Type: Microsoft Product Support Services Web site Product Support Services Source: CCN Type: Fyodor's Exploit World poison the DNS cache by returning a bogus IP as a CNAME for a real server Source: XF Type: UNKNOWN dns-poison-ns(977) | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |