Cache poisoning vulnerabilities found in 2 DNS resolving apps

“In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use,” BIND developers wrote in Wednesday’s disclosure. “BIND can be tricked into caching attacker responses, if the spoofing is successful.”

CVE-2025-40778 also raises the possibility of reviving cache poisoning attacks.

“Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache,” the developers explained. “Forged records can be injected into cache during a query, which can potentially affect resolution of future queries.”

Even in

→ Continue reading at Ars Technica

Related articles

Comments

Share article

Latest articles