[106237] in North American Network Operators' Group
Re: 2nd Exploit for DNS Cache Poisoning - RELEASED
daemon@ATHENA.MIT.EDU (Paul Ferguson)
Thu Jul 24 14:57:39 2008
From: "Paul Ferguson" <fergdawg@netzero.net>
Date: Thu, 24 Jul 2008 18:56:22 GMT
To: ml@t-b-o-h.net
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -- "Tuc at T-B-O-H.NET" <ml@t-b-o-h.net> wrote:
>Not sure if anyone has seen yet, but there is a 2nd
>exploit being circulated. I just picked it up on metasploits
>SVN trunk....
I haven't seen that one yet, but I just ran across this:
http://www.milw0rm.com/exploits/6123
- - ferg
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.3 (Build 3017)
wj8DBQFIiNBFq1pz9mNUZTMRAozhAKD+IkD/HGywNFttPI6ilKreNGP0UQCeKZ98
u76UOCvKXD9+zvdlSR8S/oc=3D
=3DN5am
-----END PGP SIGNATURE-----
--
"Fergie", a.k.a. Paul Ferguson
Engineering Architecture for the Internet
fergdawg(at)netzero.net
ferg's tech blog: http://fergdawg.blogspot.com/