[106293] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Exploit for DNS Cache Poisoning - RELEASED

daemon@ATHENA.MIT.EDU (Paul Vixie)
Fri Jul 25 17:31:36 2008

To: nanog@merit.edu
From: Paul Vixie <vixie@isc.org>
Date: Fri, 25 Jul 2008 21:31:11 +0000
In-Reply-To: <a2b2d0480807251053r6631b910nc0ea00c97bc4e21b@mail.gmail.com>
	(Alexander Harrowell's message of "Fri\,
	25 Jul 2008 18\:53\:49 +0100")
X-Vix-MailScanner-From: vixie@isc.org
Errors-To: nanog-bounces@nanog.org

in <http://permalink.gmane.org/gmane.linux.redhat.fedora.general/306278>
we see this text:

	The DNS attacks are starting!!!

	Below is a snippet of a logwatch from last night.  Be sure all DNS
	servers are updated if at all possible.  The spooks are out in full
	on this security vulnerability in force.

	THIS IS YOUR LAST WARNING...!!!
	Patch or Upgrade NOW!

	...

this ought to be an interesting weekend.
-- 
Paul Vixie

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.



home help back first fref pref prev next nref lref last post