[106293] in North American Network Operators' Group
Re: Exploit for DNS Cache Poisoning - RELEASED
daemon@ATHENA.MIT.EDU (Paul Vixie)
Fri Jul 25 17:31:36 2008
To: nanog@merit.edu
From: Paul Vixie <vixie@isc.org>
Date: Fri, 25 Jul 2008 21:31:11 +0000
In-Reply-To: <a2b2d0480807251053r6631b910nc0ea00c97bc4e21b@mail.gmail.com>
(Alexander Harrowell's message of "Fri\,
25 Jul 2008 18\:53\:49 +0100")
X-Vix-MailScanner-From: vixie@isc.org
Errors-To: nanog-bounces@nanog.org
in <http://permalink.gmane.org/gmane.linux.redhat.fedora.general/306278>
we see this text:
The DNS attacks are starting!!!
Below is a snippet of a logwatch from last night. Be sure all DNS
servers are updated if at all possible. The spooks are out in full
on this security vulnerability in force.
THIS IS YOUR LAST WARNING...!!!
Patch or Upgrade NOW!
...
this ought to be an interesting weekend.
--
Paul Vixie
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.