[106158] in North American Network Operators' Group
Re: Exploit for DNS Cache Poisoning - RELEASED
daemon@ATHENA.MIT.EDU (Tuc at T-B-O-H.NET)
Wed Jul 23 22:33:25 2008
From: "Tuc at T-B-O-H.NET" <ml@t-b-o-h.net>
To: fergdawg@netzero.net (Paul Ferguson)
Date: Wed, 23 Jul 2008 22:32:58 -0400 (EDT)
In-Reply-To: <20080723.182815.4469.2@webmail22.vgs.untd.com>
Cc: nanog@merit.edu
Errors-To: nanog-bounces@nanog.org
> - -- "Robert D. Scott" <robert@ufl.edu> wrote:
>
> >Now, there is an exploit for it.
> >
> >http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
>
> Now also (mirrored) here:
>
> http://www.milw0rm.com/exploits/6122
>
> ...and probably a slew of other places, too. ;-)
>
The changes the put into metasploit for this don't seem
to work if running from FreeBSD 5.5, possibly other BSD's and
versions from talking to the author.
Tuc/TBOH