A group of academics from the University of California and Tsinghua University has uncovered a series of critical security flaws that could lead to a revival of DNS cache poisoning attacks. Dubbed “SAD DNS attack” (short for Side-channel AttackeD DNS), the technique makes it possible for a malicious actor to carry out an off-path attack, rerouting any traffic originally destined to a specific domain to a server under their control. The flaw affects operating systems Linux 3.18-5.10, Windows Server 2019 (version 1809) and newer, MacOS 10.15 and newer.
Source: https://thehackernews.com/2020/11/sad-dns-new-flaws-re-enable-dns-cache.html