Home / Vulnerability Database / Kotlin : DNS usage
Kotlin

Kotlin : DNS usage

Classification

Overview

The application uses requests to DNS. DNS replies can not be considered trusted because of possible DNS spoofing attacks.

DNS-servers are vulnerable to attacks. It is necessary to proceed from the assumption that the application is running in an environment with an untrusted DNS server. If an attacker can update the entries in the DNS cache (cache poisoning), he/she can also redirect traffic through his/her own devices.

IP addresses are more secure than DNS names, but they can be overridden in an attack, too.

MEDIUM

DerScanner Severity Score

Do you want to fix Kotlin : DNS usage in your application?

See also

Kotlin

Kotlin : Missing required cryptographic step

Kotlin

Kotlin : Logging into system output

Kotlin

Kotlin : Call of notify() in synchronized block