[106243] in North American Network Operators' Group
Re: 2nd Exploit for DNS Cache Poisoning - RELEASED
daemon@ATHENA.MIT.EDU (Tuc at T-B-O-H.NET)
Thu Jul 24 15:46:52 2008
From: "Tuc at T-B-O-H.NET" <ml@t-b-o-h.net>
To: fergdawg@netzero.net (Paul Ferguson)
Date: Thu, 24 Jul 2008 15:46:24 -0400 (EDT)
In-Reply-To: <20080724.115622.4708.1@webmail19.vgs.untd.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org
> - -- "Tuc at T-B-O-H.NET" <ml@t-b-o-h.net> wrote:
>
> >Not sure if anyone has seen yet, but there is a 2nd
> >exploit being circulated. I just picked it up on metasploits
> >SVN trunk....
>
> I haven't seen that one yet, but I just ran across this:
>
> http://www.milw0rm.com/exploits/6123
>
> - - ferg
>
>
Sorry, block from the new one :
===============/========================================================
Exploit ID: CAU-EX-2008-0003
Release Date: 2008.07.23
Title: bailiwicked_domain.rb
Description: Kaminsky DNS Cache Poisoning Flaw Exploit for Domains
Tested: BIND 9.4.1-9.4.2
Attributes: Remote, Poison, Resolver, Metasploit
Exploit URL: http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
Author/Email: I)ruid <druid (@) caughq.org>
H D Moore <hdm (@) metasploit.com>
===============/========================================================
Tuc/TBOH