http://www.kb.cert.org/vuls/id/800113
http://securosis.com/2008/07/08/dan-kaminsky-discovers-fundamental-issue-in-dns-massive-multivendor-patch-released/
My sources tell me this is potentially huge.
This is an archived forum and the content is probably no longer relevant, but is provided here for posterity.
The active forums are here.
July 08, 2008 6:07pm
Subscribe [2]#1 / Jul 08, 2008 6:07pm
http://www.kb.cert.org/vuls/id/800113
http://securosis.com/2008/07/08/dan-kaminsky-discovers-fundamental-issue-in-dns-massive-multivendor-patch-released/
My sources tell me this is potentially huge.
#2 / Jul 09, 2008 1:10am
Hey I.G.
Going back to 9-5 work 😊 This seems like an old beast…Why is it resurrected now?
MS has it tagged as of Published:// November 13, 2007
Do tell 😉
#3 / Jul 09, 2008 2:50am
That’s not the same vulnerability. The MS one “Could Allow Spoofing”... Well, big deal. The current one is of another caliber, and affects practically the whole DNS, not just MS’s implementation. They released a multi-vendor patch yesterday, with full disclosure to follow on Aug 6th. If you’ve got anything to do with nameservers, you should patch them asap.
#4 / Jul 09, 2008 3:04am
Just spend some time reading through…and Holly crap. EE on pause.
Another handy link http://doxpara.com/.
Thanks for pointing this out!
#5 / Jul 24, 2008 4:19pm
Not wanting to sound too alarmist, but there is an exploit in the wild now. Phishers are going to have a field day :/(
#6 / Jul 24, 2008 6:01pm
exploit for the patches released?
#7 / Jul 24, 2008 6:08pm
No, for the unpatched servers. If your responsible sysadmin applied the vendor-provided patch you should be fine, but the adaption rate is not great. Figures I have seen speak of a 30-40% patch rate so far.
#8 / Jul 24, 2008 6:15pm
Oh got it, you scared me. Quite honestly these patches are still hard to find even with vendors that released them. I’ve spent enough time with fingers crossed on remote reboots.
Also, for who ever is reading this, you should look for client/workstation OS patches as well.
Thank you.
#9 / Jul 27, 2008 11:31am