![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.103718 |
Kategorie: | Denial of Service |
Titel: | DNS Amplification Attacks (UDP) |
Zusammenfassung: | A misconfigured Domain Name System (DNS) server can be exploited; to participate in a Distributed Denial of Service (DDoS) attack. |
Beschreibung: | Summary: A misconfigured Domain Name System (DNS) server can be exploited to participate in a Distributed Denial of Service (DDoS) attack. Vulnerability Insight: A Domain Name Server (DNS) Amplification attack is a popular form of Distributed Denial of Service (DDoS) that relies on the use of publicly accessible open recursive DNS servers to overwhelm a victim system with DNS response traffic. The basic attack technique consists of an attacker sending a DNS name lookup request to an open recursive DNS server with the source address spoofed to be the victim's address. When the DNS server sends the DNS record response, it is sent instead to the victim. Attackers will typically submit a request for as much zone information as possible to maximize the amplification effect. Because the size of the response is typically considerably larger than the request, the attacker is able to amplify the volume of traffic directed at the victim. By leveraging a botnet to perform additional spoofed DNS queries, an attacker can produce an overwhelming amount of traffic with little effort. Additionally, because the responses are legitimate data coming from valid servers, it is especially difficult to block these types of attacks. Note: This finding might be an acceptable risk if you: - trust all clients which can reach the server - do not allow recursive queries from outside your trusted client network Solution: There are multiple possible mitigation steps depending on location and functionality needed by the DNS server: - Disable recursion - Don't allow public access to DNS Servers doing recursion - Leave recursion enabled if the DNS Server stays on a corporate network that cannot be reached by untrusted clients CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2006-0987 Bugtraq: 20060228 recursive DNS servers DDoS as a growing DDoS problem (Google Search) http://www.securityfocus.com/archive/1/426368/100/0/threaded http://dns.measurement-factory.com/surveys/sum1.html http://www.us-cert.gov/reading_room/DNS-recursion121605.pdf |
Copyright | Copyright (C) 2013 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |