Remote Code Execution via DNS Cache Poisoning

Remote Code Execution via DNS Cache Poisoning

CVE-2016-10152 · HIGH Severity

AV:N/AC:L/AU:N/C:C/I:C/A:C

The read_config_file function in lib/hesiod.c in Hesiod 3.2.1 falls back to the ".athena.mit.edu" default domain when opening the configuration file fails, which allows remote attackers to gain root privileges by poisoning the DNS cache.

Learn more about our Web Application Penetration Testing UK.