Oracle Solaris Networking (MOSC)

MOSC Banner

Fix for DNS cache spoofing/poisoning attack

edited Nov 2, 2023 5:15PM in Oracle Solaris Networking (MOSC) 1 commentQuestion

Hi

The scanner had flag out a vulnerability in Solaris 11.4.

Below is the description of the vulnerability

How can we fix this?


The remote DNS server responds to queries for third-party domains

that do not have the recursion bit set.


This may allow a remote attacker to determine which domains have

recently been resolved via this name server, and therefore which hosts

have been recently visited.


For instance, if an attacker was interested in whether your company

utilizes the online services of a particular financial institution,

they would be able to use this attack to build a statistical model

regarding company usage of that financial institution. Of course, the

Howdy, Stranger!

Log In

To view full details, sign in to My Oracle Support Community.

Register

Don't have a My Oracle Support Community account? Click here to get started.

Category Leaderboard

Top contributors this month

New to My Oracle Support Community? Visit our Welcome Center

MOSC Help Center