[106156] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Exploit for DNS Cache Poisoning - RELEASED

daemon@ATHENA.MIT.EDU (Paul Ferguson)
Wed Jul 23 21:30:23 2008

From: "Paul Ferguson" <fergdawg@netzero.net>
Date: Thu, 24 Jul 2008 01:28:15 GMT
To: robert@ufl.edu
Cc: nanog@merit.edu
Errors-To: nanog-bounces@nanog.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -- "Robert D. Scott" <robert@ufl.edu> wrote:

>Now, there is an exploit for it.
>
>http://www.caughq.org/exploits/CAU-EX-2008-0002.txt

Now also (mirrored) here:

 http://www.milw0rm.com/exploits/6122

=2E..and probably a slew of other places, too. ;-)

- - ferg

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFIh9qmq1pz9mNUZTMRAuXEAJ0cmn10Rz4Z0RG5LfseroFFvLbUmgCgipoV
rLDjjPCo+7w7+aV8udRK7fc=3D
=3Dn1cC
-----END PGP SIGNATURE-----



--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/




home help back first fref pref prev next nref lref last post