Tuesday, July 08, 2008

Fundamental Issue In DNS

CERT is issuing an advisory for a massive multivendor patch release
to resolve a major issue in DNS that could allow attackers to easily compromise any name server (it also affects clients). Dan Kaminsky discovered the flaw early this year and has been working with a large group of vendors on a coordinated patch release.

The issue is extremely serious, and all name servers should be patched as soon as possible. Updates are also being released for a variety of other platforms since this is a problem with the DNS protocol itself, not a specific implementation. The good news is this is a really strange situation where the fix does not immediately reveal the vulnerability and reverse engineering isn’t directly possible.

No comments:

Edward A. Villarreal. Powered by Blogger.

Labels

Total Pageviews