US-CERT: DNS Cache Poisoning Public Exploit Code Available
US-CERT is aware of publicly available exploit code for a cache poisoning vulnerability in common DNS implementations. Exploitation of this vulnerability may allow an attacker to cause a nameserver's clients to contact the incorrect, and possibly malicious hosts for particular services. As a result, web traffic, email and other important network data could be redirected to systems under the attacker's control.
US-CERT strongly urges administrators to patch affected systems immediately. Please review the following US-CERT documents for further details:
US-CERT will provide additional information as it becomes available.