CAPEC-142: DNS Cache Poisoning

ID CAPEC-142
Typical Severity High
Likelihood Of Attack High
Status Draft

A domain name server translates a domain name (such as www.example.com) into an IP address that Internet hosts use to contact Internet resources. An adversary modifies a public DNS cache to cause certain names to resolve to incorrect addresses that the adversary specifies. The result is that client applications that rely upon the targeted cache for domain name resolution will be directed not to the actual address of the specified domain name but to some other address. Adversaries can use this to herd clients to sites that install malware on the victim's computer or to masquerade as part of a Pharming attack.

https://capec.mitre.org/data/definitions/142.html

Weaknesses

# ID Name Type
CWE-345 Insufficient Verification of Data Authenticity weakness
CWE-346 Origin Validation Error weakness
CWE-348 Use of Less Trusted Source weakness
CWE-349 Acceptance of Extraneous Untrusted Data With Trusted Data weakness
CWE-350 Reliance on Reverse DNS Resolution for a Security-Critical Action weakness

Taxonomiy Mapping

Type # ID Name
ATTACK 1584.002 Compromise Infrastructure: DNS Server
Loading...