[dns-operations] CERT VU#800113 Multiple DNS implementations vulnerable to cache poisoning

Joao Damas Joao_Damas at isc.org
Wed Jul 9 10:59:53 UTC 2008


for the details you will have to wait until Dan Kaminsky's talk at  
black hat in august

On 9 Jul 2008, at 12:42, Lutz Donnerhacke wrote:

> * Duane Wessels wrote:
>> http://www.kb.cert.org/vuls/id/800113
>>    Recent additional research into [DNS defects and deficiencies]
>>    and methods of combining them to conduct improved cache poisoning
>>    attacks have yielded extremely effective exploitation techniques.
>
> That is very weak claim. Poisoning is not a new problem. What is  
> really new?
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.oarci.net
> http://lists.oarci.net/mailman/listinfo/dns-operations




More information about the dns-operations mailing list