DNS Response Rate Limiting Vulnerability in Multiple Linux Distributions
CVE-2013-5661
5.9MEDIUM
Summary
A cache poisoning vulnerability has been identified in the DNS response rate limiting mechanism present in several Linux distributions. This flaw can potentially allow attackers to exploit DNS infrastructure, leading to manipulation of DNS responses. If successfully exploited, an attacker could redirect legitimate traffic to malicious sites, posing a significant risk to system integrity and user privacy. It is crucial for administrators to apply patches and review their DNS configurations to mitigate possible threats stemming from this vulnerability.
References
CVSS V3.1
Score:
5.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved