Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Client-Side DNS Attack Emerges From Academic Research

A new DNS cache poisoning attack is developed as part of the research toward a dissertation.

The rise of speculative execution side-channel vulnerabilities is having an interesting side effect: More researchers from academia are finding their names in CVEs and bounty notices, and, in turn, those from the security business side are finding themselves collaborating more with those academics. 

A recent DNS cache-poisoning attack that exploits a vulnerability found in mDNSResponder, a component used in name resolution in a variety of operating systems, illustrates one of the ways in which academic research is having an impact on commercial computing on a far faster cycle than the years typically associated with research and publication at universities.

A team of researchers, led by Ph.D. candidate Fatemah Alharbi, at the University of California, Riverside, discovered the attack as part of Alharbi's doctoral research. "We found that the client-side DNS cache poisoning attack has never been technically and practically studied before; thus, I decided to choose this project as my first project in my PhD study," Alharbi told Dark Reading in an email interview.

Alharbi's group began to research the possible attack on Android and Ubuntu Linux. Once they demonstrated a successful attack, they moved on to see whether the same vulnerability existed for MacOS and Windows.

"As expected, we found the needed vulnerability to launch the attack and succeeded in poisoning the DNS cache of these two operating systems as well," she said. "[As a result], one of the machine users can launch the attack and poisons the DNS cache (without any root or admin privileges) with a malicious DNS mapping. Since there is no complete isolation between users, another user (even the admin) visiting the same domain will end up visiting the webserver that is controlled by the attacker instead of the legitimate webserver."

The attack itself takes advantage of the fact that the OS DNS cache used by mDNSResponder is shared among all the users of a given machine — and that cache is generally without explicit protection. "Client devices are typically not considered to be part of the DNS hierarchy and therefore have not been considered by defenses against DNS cache poisoning," Alharbi said.

The research team disclosed the attack to the vendors and was recognized by Apple in the security notes for macOS Mojave 10.14.3, Security Update 2019-001 High Sierra, and Security Update 2019-001 Sierra. Aside from the mitigation that may come through operating system updates, there are few good options available on the client system.

"One easy and fast solution is to disable the DNS cache," Alharbi said. "The downside about this is that the client has to wait for the DNS response after the DNS resolution process is complete for each DNS query she sends."

Another downside, she noted, is that the dependence entirely on the DNS server (and the additional traffic that represents) could make the DNS resolver more vulnerable to DDoS attacks.

The paper describing the attack and potential remediation will be published in the proceedings of IEEE International Conference on Computer Communications (INFOCOM) 2019, in Paris this May.

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Related Content:

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4031
PUBLISHED: 2019-10-16
IBM Workload Scheduler Distributed 9.2, 9.3, 9.4, and 9.5 contains a vulnerability that could allow a local user to write files as root in the file system, which could allow the attacker to gain root privileges. IBM X-Force ID: 155997.
CVE-2019-17626
PUBLISHED: 2019-10-16
ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.
CVE-2019-17627
PUBLISHED: 2019-10-16
The Yale Bluetooth Key application for mobile devices allows unauthorized unlock actions by sniffing Bluetooth Low Energy (BLE) traffic during one authorized unlock action, and then calculating the authentication key via simple computations on the hex digits of a valid authentication request. This a...
CVE-2019-17625
PUBLISHED: 2019-10-16
There is a stored XSS in Rambox 0.6.9 that can lead to code execution. The XSS is in the name field while adding/editing a service. The problem occurs due to incorrect sanitization of the name field when being processed and stored. This allows a user to craft a payload for Node.js and Electron, such...
CVE-2019-17624
PUBLISHED: 2019-10-16
In X.Org X Server 1.20.4, there is a stack-based buffer overflow in the function XQueryKeymap. For example, by sending ct.c_char 1000 times, an attacker can cause a denial of service (application crash) or possibly have unspecified other impact.