Vulnerability in DNS Resolver of Android by Google
CVE-2012-2808

Currently unrated

Key Information:

Vendor
Google
Status
Vendor
CVE Published:
1 April 2015

Summary

The random number generation implementation in the DNS resolver of Android before version 4.1.1 is flawed. It relies on predictable values derived from time and process ID, which can potentially allow attackers to guess the query ID values and UDP source ports used in DNS transactions. This predictability may enable attackers to successfully spoof DNS responses, thereby compromising the integrity and reliability of DNS queries.

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.