[原文]The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2015-0800.
Google Android res_randomid() Function DNS Cache Poisoning Weakness
Mobile Phone / Hand-held Device
Loss of Integrity
Google Android is vulnerable to a DNS Cache poisoning weakness that is triggered when the wrapper fails to randomly acquire a port with it's own DNS port implementation. After failing to do so ten times it will authorize the use res_randomid() function of res_init.c to complete the task. This function draws from the port from a predictable set of numbers, which may make it easier for a remote attacker to poison the DNS cache of a target user.
It has been reported that this issue has been fixed. Upgrade to version 4.1.1, or higher, to address this vulnerability.