[wellylug] SANS: DNS Bug Now Public? (fwd)

Mark Foster blakjak at blakjak.net
Sat Jul 26 10:09:01 NZST 2008



---------- Forwarded message ----------
Date: Sat, 26 Jul 2008 10:08:40 +1200 (NZST)
From: Mark Foster <blakjak at blakjak.net>
To: nzlug at linux.net.nz, aucklug at linux.net.nz
Subject: SANS: DNS Bug Now Public? (fwd)

Forgive the cross-post but anyone running a DNS platform needs to be aware of 
this.

Essentially if you've been living under a rock:

- DNS servers offering recursive service to anyone-who-wants are vulnerable to 
man-in-the-middle attacks
- patch, patch, patch now!!

The URL below gives more info.


Mark.



---------- Forwarded message ----------
Date: Tue, 22 Jul 2008 08:40:32 -0400
Subject: SANS: DNS Bug Now Public?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SANS is reporting that Kaminsky's DNS bug may be now being exploited in
the wild. See:
 	http://isc.sans.org/diary.html?n&storyid=4765

Jon Kibler
- --
Jon R. Kibler
Chief Technical Officer
Advanced Systems Engineering Technology, Inc.
Charleston, SC  USA
o: 843-849-8214
c: 843-224-2494
s: 843-564-4224

My PGP Fingerprint is:
BAA2 1F2C 5543 5D25 4636 A392 515C 5045 CF39 4253

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkiF1T8ACgkQUVxQRc85QlMN1ACfTR8oJRy2V27+c5PjERcUjgIU
evAAn1sDR9xMc1bEmTeygXl7QkF9er2T
=eqbc
-----END PGP SIGNATURE-----




==================================================
Filtered by: TRUSTEM.COM's Email Filtering Service
http://www.trustem.com/
No Spam. No Viruses. Just Good Clean Email.



More information about the wellylug mailing list