[106151] in North American Network Operators' Group
Re: Exploit for DNS Cache Poisoning - RELEASED
daemon@ATHENA.MIT.EDU (Tuc at T-B-O-H.NET)
Wed Jul 23 19:03:03 2008
From: "Tuc at T-B-O-H.NET" <ml@t-b-o-h.net>
To: robert@ufl.edu (Robert D. Scott)
Date: Wed, 23 Jul 2008 19:00:29 -0400 (EDT)
In-Reply-To: <001b01c8ed11$72ec39d0$58c4ad70$@edu>
Cc: nanog@merit.edu
Errors-To: nanog-bounces@nanog.org
>
> Now, there is an exploit for it.
>
> http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
>
For anyone looking to use it, you MUST update the frameworks
libraries. Some of the code only came out ~5 hours ago that
it needs.
Tuc/TBOH