<--

BIND 9 NS Selection SRTT Algorithm Weakness

Aleph Research Advisory

Identifier

Severity

Moderate

Product

ISC BIND

Technical Details

An off-path attacker can influence the SRTT algorithm implemented by BIND, in order to derandomize the NS selection, i.e. the attacker can easily and deterministically control the queried name server chosen by BIND’s resolver. The attack reduces the time and effort required to successfully poison BIND’s cache.

Timeline

Credit

External References