Remote Code Execution via DNS Cache Poisoning
CVE-2016-10152 · HIGH Severity
AV:N/AC:L/AU:N/C:C/I:C/A:C
The read_config_file function in lib/hesiod.c in Hesiod 3.2.1 falls back to the ".athena.mit.edu" default domain when opening the configuration file fails, which allows remote attackers to gain root privileges by poisoning the DNS cache.
Learn more about our Web Application Penetration Testing UK.