A new critical vulnerability in the Domain Name System (DNS) has been found. This vulnerability allows a specialized attack called “TuDoor” that can poison DNS caches, cause denial-of-service (DoS) attacks, and deplete resources, posing a significant threat to internet security.
Specialists have conducted experiments that confirm the feasibility of the TuDoor attack, revealing its serious implications in real-world scenarios. A striking total of 24 widely used DNS programs, including BIND, PowerDNS, and Microsoft DNS, have been found vulnerable to TuDoor. In less than a single second, attackers can execute cache poisoning or DoS attacks against these vulnerable resolvers using just a handful of precisely fabricated packets.
By infosecbulletin
/ Saturday , December 21 2024
CISA has released eight advisories on vulnerabilities in Industrial Control Systems (ICS). These vulnerabilities affect essential software and hardware in...
Read More
By infosecbulletin
/ Friday , December 20 2024
Bank Rakyat Indonesia (BRI), the largest state bank by assets, has assured customers that their data and funds are secure...
Read More
By infosecbulletin
/ Friday , December 20 2024
Cybersecurity researcher Jeremiah Fowler reported to Website Planet that he found a non-password-protected 1.2 TB dataset containing over 3 million...
Read More
By infosecbulletin
/ Friday , December 20 2024
Sophos has fixed three separate security vulnerabilities in Sophos Firewall. The vulnerabilities CVE-2024-12727, CVE-2024-12728, and CVE-2024-12729 present major risks, such...
Read More
By infosecbulletin
/ Thursday , December 19 2024
A time-demanding workshop on "Cybersecurity Awareness and Needs Analysis" was held on Thursday (December 19) at Bangladesh Bank Training Academy...
Read More
By infosecbulletin
/ Thursday , December 19 2024
Kaspersky's Global Emergency Response Team (GERT) found that attackers are exploiting a patched SQL injection vulnerability (CVE-2023-48788) in Fortinet FortiClient...
Read More
By infosecbulletin
/ Wednesday , December 18 2024
The US government is considering banning a well-known brand of Chinese-made home internet routers TP-Link due to concerns that they...
Read More
By infosecbulletin
/ Wednesday , December 18 2024
Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
By infosecbulletin
/ Wednesday , December 18 2024
CISA has issued Binding Operational Directive (BOD) 25-01, requiring federal civilian agencies to improve the security of their Microsoft 365...
Read More
By infosecbulletin
/ Wednesday , December 18 2024
The Irish Data Protection Commission fined Meta €251 million ($263.6 million) for GDPR violations related to a 2018 data breach...
Read More
Researchers tested 16 Wi-Fi router models, 6 operating systems, 42 DNS services, and about 1.8 million open DNS resolvers. The study found that TuDoor could exploit 7 routers, 18 DNS services, and 424,652 open DNS resolvers.
The researchers followed best practices for responsible disclosure by informing all affected vendors of the vulnerabilities. 18 vendors, such as BIND, Chrome, Cloudflare, and Microsoft, confirmed the findings and discussed ways to fix the issues. 33 CVE identifiers were assigned to the vulnerabilities, and an online tool for their detection was suggested.
Collaboration among researchers, developers, and users is crucial to ensure a secure digital environment. We need constant vigilance to address new vulnerabilities like TuDoor. By working together, we can achieve innovation and protection simultaneously.