[105876] in North American Network Operators' Group
Re: Multiple DNS implementations vulnerable to cache poisoning
daemon@ATHENA.MIT.EDU (Jay R. Ashworth)
Tue Jul 8 19:20:25 2008
Date: Tue, 8 Jul 2008 19:20:05 -0400
From: "Jay R. Ashworth" <jra@baylink.com>
To: nanog@nanog.org
In-Reply-To: <D0D0330CBD07114D85B70B784E80C2F2022FC9E8@exch-mail2.win.slac.stanford.edu>
Errors-To: nanog-bounces@nanog.org
On Tue, Jul 08, 2008 at 01:48:57PM -0700, Buhrmaster, Gary wrote:
> Multiple DNS implementations vulnerable to cache poisoning:
>
> http://www.kb.cert.org/vuls/id/800113
>
> (A widely coordinated vendor announcement. As always,
> check with your vendor(s) for patch status.)
Obligatory Slashdot link: http://it.slashdot.org/article.pl?sid=08/07/08/195225
(There's actually some useful data in the comments for a change, or I
wouldn't have bothered.)
Cheers,
-- jra
--
Jay R. Ashworth Baylink jra@baylink.com
Designer The Things I Think RFC 2100
Ashworth & Associates http://baylink.pitas.com '87 e24
St Petersburg FL USA http://photo.imageinc.us +1 727 647 1274
Those who cast the vote decide nothing.
Those who count the vote decide everything.
-- (Joseph Stalin)