[wellylug] SANS: DNS Bug Now Public? (fwd)
Mark Foster
blakjak at blakjak.net
Sat Jul 26 10:09:01 NZST 2008
---------- Forwarded message ----------
Date: Sat, 26 Jul 2008 10:08:40 +1200 (NZST)
From: Mark Foster <blakjak at blakjak.net>
To: nzlug at linux.net.nz, aucklug at linux.net.nz
Subject: SANS: DNS Bug Now Public? (fwd)
Forgive the cross-post but anyone running a DNS platform needs to be aware of
this.
Essentially if you've been living under a rock:
- DNS servers offering recursive service to anyone-who-wants are vulnerable to
man-in-the-middle attacks
- patch, patch, patch now!!
The URL below gives more info.
Mark.
---------- Forwarded message ----------
Date: Tue, 22 Jul 2008 08:40:32 -0400
Subject: SANS: DNS Bug Now Public?
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SANS is reporting that Kaminsky's DNS bug may be now being exploited in
the wild. See:
http://isc.sans.org/diary.html?n&storyid=4765
Jon Kibler
- --
Jon R. Kibler
Chief Technical Officer
Advanced Systems Engineering Technology, Inc.
Charleston, SC USA
o: 843-849-8214
c: 843-224-2494
s: 843-564-4224
My PGP Fingerprint is:
BAA2 1F2C 5543 5D25 4636 A392 515C 5045 CF39 4253
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iEYEARECAAYFAkiF1T8ACgkQUVxQRc85QlMN1ACfTR8oJRy2V27+c5PjERcUjgIU
evAAn1sDR9xMc1bEmTeygXl7QkF9er2T
=eqbc
-----END PGP SIGNATURE-----
==================================================
Filtered by: TRUSTEM.COM's Email Filtering Service
http://www.trustem.com/
No Spam. No Viruses. Just Good Clean Email.
More information about the wellylug
mailing list