Dear DNSDist Security Team,

We are responsibly disclosing a critical DNS cache poisoning vulnerability in 
DNSDist (all versions), which we call the SHAR Attack.

Summary

Type: DNS Cache Poisoning (logic flaw)

Severity: Critical

Impact: Attackers can inject arbitrary malicious DNS records.

Exploit: Only a single crafted character is needed; no fragmentation or 
side-channel required.

Results: 20/20 experiments succeeded; average execution time < 1s.

Details

Certain special characters (~, !, *, _) cause upstream resolvers to remain 
silent.

DNSDist does not handle this condition and waits silently, allowing attackers 
to brute-force TxID + source port.

Predictable source port behavior enables near-instant cache poisoning.

This attack can amplify existing techniques (e.g., SADDNS, Tudoor).

Proof-of-Concept

Validated using a real domain; single crafted character successfully induced 
upstream silence and spoofed responses were injected with 100% success.

Recommendation

Improve source port randomization and TxID entropy.

Add spoof-prevention mechanisms.

Detect and mitigate upstream silence anomalies.

We can share the full technical report, PoC steps, and coordinated disclosure 
plan. Please advise a secure channel (encrypted email or bug bounty platform) 
for further details.

Best regards,
Fasheng Miao (Tsinghua University)
Xiang Li (AOSP Laboratory, Nankai University)
_______________________________________________
dnsdist mailing list
dnsdist@mailman.powerdns.com
https://mailman.powerdns.com/mailman/listinfo/dnsdist

Reply via email to