[106237] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: 2nd Exploit for DNS Cache Poisoning - RELEASED

daemon@ATHENA.MIT.EDU (Paul Ferguson)
Thu Jul 24 14:57:39 2008

From: "Paul Ferguson" <fergdawg@netzero.net>
Date: Thu, 24 Jul 2008 18:56:22 GMT
To: ml@t-b-o-h.net
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -- "Tuc at T-B-O-H.NET" <ml@t-b-o-h.net> wrote:

>Not sure if anyone has seen yet, but there is a 2nd
>exploit being circulated. I just picked it up on metasploits
>SVN trunk....

I haven't seen that one yet, but I just ran across this:

http://www.milw0rm.com/exploits/6123

- - ferg


-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFIiNBFq1pz9mNUZTMRAozhAKD+IkD/HGywNFttPI6ilKreNGP0UQCeKZ98
u76UOCvKXD9+zvdlSR8S/oc=3D
=3DN5am
-----END PGP SIGNATURE-----

--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/




home help back first fref pref prev next nref lref last post