Description
The remote DNS server is vulnerable to a denial of service attack because it replies to DNS responses.
An attacker could exploit this vulnerability by spoofing a DNS packet so that it appears to come from 127.0.0.1 and make the remote DNS server enter into an infinite loop, therefore denying service to legitimate users.
Solution
Contact the vendor for an appropriate upgrade.
See Also
http://www.nessus.org/u?a04dcb96
Summary
Multiple DNS vendors are reported susceptible to a denial of service
vulnerability (Axis Communication, dnrd, Don Moore, Posadis).
Insight
This vulnerability results in vulnerable DNS servers entering into an infinite
query and response message loop, leading to the consumption of network and
CPU resources, and denying DNS service to legitimate users.
Impact
An attacker may exploit this flaw by finding two vulnerable servers and
set up a 'ping-pong' attack between the two hosts.
References
CVE
CVE-2004-0789
BID
11642
Other
https://web.archive.org/web/20041112055702/http://www.uniras.gov.uk/vuls/2004/758884/index.htm
The remote DNS server is vulnerable to a denial of service attack because it replies to DNS responses.
Lol :) edit: sorry, my bad, I read "responses" as "requests".
Please read more about DNS amplification here:
https://www.us-cert.gov/ncas/alerts/TA13-088A
If you're running a public DNS resolver with AdGuard Home, here's what you can do:
Ah, wait, not lol at all!
Replying to DNS responses is a legit issue and we must resolve this.
Most helpful comment
Ah, wait, not lol at all!
Replying to DNS responses is a legit issue and we must resolve this.