Contents

  1. whois
  2. history

https://arstechnica.com/security/2025/10/bind-warns-of-bugs-that-could-bring-dns-cache-attack-back-from-the-dead/

Tech News

/Cybersecurity News Cybersecurity Daily Report

https://thedailytechfeed.com/over-706000-bind-9-resolvers-exposed-to-cache-poisoning-vulnerability/

警告: BIND resolver の不良(重大)

Answer Section 
クエリで明示的に要求されていない RRs を BIND が受け入れ、キャッシュする。

https://jprs.jp/tech/security/2025-10-23-bind9-vuln-cachepoisoning.html

https://www.cve.org/CVERecord?id=CVE-2025-40778

https://cwe.mitre.org/data/definitions/349.html

https://censys.com/advisory/cve-2025-40778?utm_content=353190508&utm_medium=social&utm_source=twitter&hss_channel=tw-3566263693

/censys

1. whois

Under certain circumstances, BIND is too lenient when accepting records from answers, 
allowing an attacker to inject forged data into the cache. 
This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39,
 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1,
 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

https://kb.isc.org/docs/cve-2025-40778

2. history


CategoryDns CategoryWatch CategoryTemplate

MoinQ: CVE/CVE-2025-40778: Cache poisoning attacks with unsolicited RRs (last edited 2025-10-29 06:47:34 by ToshinoriMaeno)