DarkFiber Consulting – IT Managed Services

DNS Cache Poisoning Public Exploit Code Available

July 25th, 2008 . by DarkFiber Consulting

DarkFiber Consulting is aware of publicly available exploit code for a cache poisoning vulnerability in common DNS implementations. Exploitation of this vulnerability may allow an attacker to cause a nameserver’s clients to contact the incorrect, and possibly malicious hosts for particular services. As a result, web traffic, email and other important network data could be redirected to systems under the attacker’s control.

DarkFiber Consulting strongly urges administrators to patch affected systems immediately. Please review the following DarkFiber Consulting documents for further details:

DarkFiber Consulting will provide additional information as it becomes available.

DNS Implementations Vulnerable to Cache Poisoning

July 14th, 2008 . by DarkFiber Consulting

DarkFiber Consulting is aware of deficiencies in the DNS protocol. Implementations of this protocol may leave the affected system vulnerable to DNS cache poisoning attacks. If an attacker can successfully conduct a cache poisoning attack, they may be able to cause a nameserver’s clients to contact the incorrect, and possibly malicious, hosts for particular services. This may allow an attacker to obtain sensitive information or mislead users into believing they are visiting a legitimate website.

DarkFiber Consulting encourages users to review “VU#800113 – Multiple DNS implementations vulnerable to cache poisoning” and apply any necessary solutions listed in that document to help mitigate the risks.

DarkFiber Consulting will provide additional information as it becomes available.