Survey: 1 in 4 DNS servers still vulnerable to Kaminsky flaw

Annual report shows 25 percent of DNS servers still susceptible to cache poisoning via the Kaminsky flaw, 40 percent vulnerable to distributed denial of service attacks

Despite industry efforts to lock down DNS servers, one in four remain vulnerable to cache poisoning due to the well-documented Kaminsky flaw identified earlier this year and another 40 percent could be considered a danger to themselves and others, recent research shows.

According to the fourth annual DNS report issued by The Measurement Factory, 25 percent of DNS servers in the sample group have not been upgraded to perform source port randomization, which is considered the patch for the vulnerability identified earlier this year by Dan Kaminsky, director of penetration testing at IOActive. The industry group bases its study on a sample that includes 5% of the IPv4 address space, or 80 million addresses.

"A surprising number of have not been upgraded and are very vulnerable to cache poisoning," according to a press release from IP address management vendor Infoblox and DNS service and tools provider DNSstuff.

A separate survey of 466 enterprise online customers conducted by DNSstuff in September revealed that 9.6 percent hadn't patched their DNS servers yet and 21.9 percent didn't know if they were patched. The findings show that despite the DNS community's and several vendors' efforts, a significant number of server administrators have yet to take action. As for the reasons behind the lack of patches, more than 45 percent cited a lack of internal resources, 30 percent said they were unaware of the vulnerability and 24 percent reported they didn't have enough knowledge of DNS to take the appropriate steps. DNSstuff's customer research also found that the most common DNS issues include e-mail downtime for 69 percent, distributed denial-of-service (DDoS) attacks and cache poisoning attacks for nearly half of respondents and spoofing for 18.5 percent.

Another potentially worrisome finding is that more than 40 percent of Internet name servers allow recursive queries, leaving "millions of open recursors on the Internet, a danger both to themselves and others -- they are vulnerable to cache poisoning and DDoS attacks," The Measurement Group reports. Another 30 percent of those addresses sampled allow zone transfers to arbitrary requesters, which make servers targets for DoS attacks.

"Even if an enterprise has gone to the trouble of patching against the Kaminsky vulnerability, there are many other aspects of configuration, like recursion and open zone transfers, that should also be secured," said Cricket Lui, vice president of architecture at Infoblox, in a press release. "If not, organizations are essentially locking their door to the house, but leaving the windows wide open."

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags dns flawKaminsky

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Denise Dubie

Network World
Show Comments

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Cate Bacon

Aruba Instant On AP11D

The strength of the Aruba Instant On AP11D is that the design and feature set support the modern, flexible, and mobile way of working.

Dr Prabigya Shiwakoti

Aruba Instant On AP11D

Aruba backs the AP11D up with a two-year warranty and 24/7 phone support.

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers


This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang


It really doesn’t get more “gaming laptop” than this.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?