[106243] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: 2nd Exploit for DNS Cache Poisoning - RELEASED

daemon@ATHENA.MIT.EDU (Tuc at T-B-O-H.NET)
Thu Jul 24 15:46:52 2008

From: "Tuc at T-B-O-H.NET" <ml@t-b-o-h.net>
To: fergdawg@netzero.net (Paul Ferguson)
Date: Thu, 24 Jul 2008 15:46:24 -0400 (EDT)
In-Reply-To: <20080724.115622.4708.1@webmail19.vgs.untd.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

> - -- "Tuc at T-B-O-H.NET" <ml@t-b-o-h.net> wrote:
> 
> >Not sure if anyone has seen yet, but there is a 2nd
> >exploit being circulated. I just picked it up on metasploits
> >SVN trunk....
> 
> I haven't seen that one yet, but I just ran across this:
> 
> http://www.milw0rm.com/exploits/6123
> 
> - - ferg
> 
> 
	Sorry, block from the new one :

===============/========================================================
Exploit ID:     CAU-EX-2008-0003
Release Date:   2008.07.23
Title:          bailiwicked_domain.rb
Description:    Kaminsky DNS Cache Poisoning Flaw Exploit for Domains
Tested:         BIND 9.4.1-9.4.2
Attributes:     Remote, Poison, Resolver, Metasploit
Exploit URL:    http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
Author/Email:   I)ruid <druid (@) caughq.org>
                H D Moore <hdm (@) metasploit.com>
===============/========================================================

			Tuc/TBOH


home help back first fref pref prev next nref lref last post