[dns-operations] CERT VU#800113 Multiple DNS implementations vulnerable to cache poisoning
Joao Damas
Joao_Damas at isc.org
Wed Jul 9 10:59:53 UTC 2008
for the details you will have to wait until Dan Kaminsky's talk at
black hat in august
On 9 Jul 2008, at 12:42, Lutz Donnerhacke wrote:
> * Duane Wessels wrote:
>> http://www.kb.cert.org/vuls/id/800113
>> Recent additional research into [DNS defects and deficiencies]
>> and methods of combining them to conduct improved cache poisoning
>> attacks have yielded extremely effective exploitation techniques.
>
> That is very weak claim. Poisoning is not a new problem. What is
> really new?
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.oarci.net
> http://lists.oarci.net/mailman/listinfo/dns-operations
More information about the dns-operations
mailing list