{"vulnerability": "CVE-2020-25705", "sightings": [{"uuid": "9b766693-9144-415d-b302-223eb770c4e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25705", "type": "seen", "source": "MISP/8bf83bbc-da70-46f8-bc54-a31bfdf4e014", "content": "", "creation_timestamp": "2024-11-14T06:07:37.000000Z"}, {"uuid": "b9fcce06-ba3a-4a92-92e1-15e037aaba25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25705", "type": "seen", "source": "https://t.me/thehackernews/897", "content": "\u26a1 SAD DNS Attack !!!\n\nA series of new vulnerabilities (CVE-2020-25705) in Linux, Windows, macOS, and FreeBSD systems re-enable classic DNS cache poisoning attack, leaving millions of users vulnerable.\n\nDetails: https://thehackernews.com/2020/11/sad-dns-new-flaws-re-enable-dns-cache.html", "creation_timestamp": "2020-11-13T08:14:44.000000Z"}, {"uuid": "22c26075-6670-404f-9193-f8a6c4dc9f30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25705", "type": "seen", "source": "https://t.me/cKure/2792", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 Sad DNS Attack\u2014 New Flaws Re-Enable DNS Cache Poisoning Attacks.\n\nCVE-2020-25705\n\nhttps://thehackernews.com/2020/11/sad-dns-new-flaws-re-enable-dns-cache.html", "creation_timestamp": "2020-11-13T08:01:15.000000Z"}, {"uuid": "7b65cddd-53c9-40f2-b6d9-1aa431bb299d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25705", "type": "seen", "source": "https://t.me/HackerOne/2833", "content": "\u26a1 SAD DNS Attack !!!\n\nA series of new vulnerabilities (CVE-2020-25705) in Linux, Windows, macOS, and FreeBSD systems re-enable classic DNS cache poisoning attack, leaving millions of users vulnerable.\n\nDetails: https://thehackernews.com/2020/11/sad-dns-new-flaws-re-enable-dns-cache.html", "creation_timestamp": "2020-11-13T08:17:27.000000Z"}, {"uuid": "833f1404-449a-4240-b801-de3e049cdf79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25705", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2089", "content": "#Research\n\"DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels\" (CVE-2020-25705), 2020.\n]-&gt; PoC: https://github.com/tdwyer/CVE-2020-25705", "creation_timestamp": "2024-09-28T17:36:05.000000Z"}, {"uuid": "8e9cc10f-2e9a-435a-bceb-d0055620d1b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25705", "type": "seen", "source": "https://t.me/cibsecurity/16425", "content": "\u203c CVE-2020-25705 \u203c\n\nA flaw in the way reply ICMP packets are limited in the Linux kernel functionality was found that allows to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well. Kernel versions before 5.10 may be vulnerable to this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-17T07:38:29.000000Z"}]}