When dnsproxy starts it unnecessary listens to a random UDP port on all interfaces.
This opened port is not required to dnsproxy do their job.
If someone connects on that port it's possible to send unwanted DNS answers to dnsproxy,
these answers can be forwarded to the client, but an attacker needs to know the DNS ID
used by the client and the DNS ID used by dnsproxy.
When dnsproxy starts it unnecessary listens to a random UDP port on all interfaces. This opened port is not required to dnsproxy do their job. If someone connects on that port it's possible to send unwanted DNS answers to dnsproxy, these answers can be forwarded to the client, but an attacker needs to know the DNS ID used by the client and the DNS ID used by dnsproxy.