First published: Mon Mar 19 2012(Updated: )
It was reported [1],[2] that MaraDNS suffers from a flaw where it is susceptible to spoofing attacks. Due to an error in the cache update policy, which does not properly handle revoked domain names, a remote attacker could keep a domain name resolvable after it has been deleted from the registration. This flaw is fixed in versions 1.3.0.7.15 and 1.4.12, and is reported to affect all prior versions. [1] <a href="http://www.maradns.org/changelog.html">http://www.maradns.org/changelog.html</a> [2] <a href="https://secunia.com/advisories/48492/">https://secunia.com/advisories/48492/</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
MaraDNS | <1.3.07.15 | |
MaraDNS | >=1.4.0<1.4.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1570 is classified as a moderate severity vulnerability due to its potential for spoofing attacks.
CVE-2012-1570 affects MaraDNS by allowing remote attackers to keep a domain name resolvable after it has been revoked.
To fix CVE-2012-1570, it is recommended to upgrade to MaraDNS versions later than 1.4.12 or to patch the software as prompted by vendor recommendations.
CVE-2012-1570 affects MaraDNS versions prior to 1.3.07.15 and versions within the range of 1.4.0 to 1.4.12 inclusive.
Mitigating CVE-2012-1570 without upgrading may involve configuring DNS settings to prevent the caching of revoked domain names, although this may not be completely effective.