Thursday, July 24, 2008

US-CERT: DNS Cache Poisoning Public Exploit Code Available


US-CERT is aware of publicly available exploit code for a cache poisoning vulnerability in common DNS implementations. Exploitation of this vulnerability may allow an attacker to cause a nameserver's clients to contact the incorrect, and possibly malicious hosts for particular services. As a result, web traffic, email and other important network data could be redirected to systems under the attacker's control.

US-CERT strongly urges administrators to patch affected systems immediately. Please review the following US-CERT documents for further details:

US-CERT will provide additional information as it becomes available.

More here.


Post a Comment

<< Home