Vulnerability in DNS Resolver of Android by Google
CVE-2012-2808
Currently unrated
Summary
The random number generation implementation in the DNS resolver of Android before version 4.1.1 is flawed. It relies on predictable values derived from time and process ID, which can potentially allow attackers to guess the query ID values and UDP source ports used in DNS transactions. This predictability may enable attackers to successfully spoof DNS responses, thereby compromising the integrity and reliability of DNS queries.
References
Timeline
Vulnerability published
Vulnerability Reserved