DNS TLD & Out of Zone NS Domain...

- AV AC AU C I A
发布: 2000-01-23
修订: 2025-04-13

A vulnerability exists in the mechanism used by DNS, in general, to determine the name server associated with TLD's (top level domains). DNS is built upon levels of trust, and by exploiting single points of failure in this trust system, it becomes possible for an attacker to convince a caching nameserver that allows for recursion through it that the root server for a given TLD is something other than what it actually is. By consecutively performing these cache attacks, it could be possible for an attacker to entirely take over name service for any given domain. The vulnerability is actually not specific to TLD's. The same attack can be used to hijack any domain which has out of zone NS records, if any of the servers that act as the name server for the out of zone domain can be compromised. The simplest explanation was presented in the example provided by it's discoverer, Dan Bernstein, on the Bugtraq mailing list, on January 23, 2000: "Suppose an attacker can make recursive queries...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息