[dnsdist] Vulnerability Disclosure: Critical Cache Poisoning in DNSDist (SHAR Attack)

苗发生 mfs24 at mails.tsinghua.edu.cn
Tue Aug 19 16:23:01 UTC 2025


Dear DNSDist Security Team,

We are responsibly disclosing a critical DNS cache poisoning vulnerability in DNSDist (all versions), which we call the SHAR Attack.

Summary

Type: DNS Cache Poisoning (logic flaw)

Severity: Critical

Impact: Attackers can inject arbitrary malicious DNS records.

Exploit: Only a single crafted character is needed; no fragmentation or side-channel required.

Results: 20/20 experiments succeeded; average execution time < 1s.

Details

Certain special characters (~, !, *, _) cause upstream resolvers to remain silent.

DNSDist does not handle this condition and waits silently, allowing attackers to brute-force TxID + source port.

Predictable source port behavior enables near-instant cache poisoning.

This attack can amplify existing techniques (e.g., SADDNS, Tudoor).

Proof-of-Concept

Validated using a real domain; single crafted character successfully induced upstream silence and spoofed responses were injected with 100% success.

Recommendation

Improve source port randomization and TxID entropy.

Add spoof-prevention mechanisms.

Detect and mitigate upstream silence anomalies.

We can share the full technical report, PoC steps, and coordinated disclosure plan. Please advise a secure channel (encrypted email or bug bounty platform) for further details.

Best regards,
Fasheng Miao (Tsinghua University)
Xiang Li (AOSP Laboratory, Nankai University)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.powerdns.com/pipermail/dnsdist/attachments/20250820/69d52eb0/attachment.htm>


More information about the dnsdist mailing list