Wed, Jul 9 2008 5:07
DNS Implementations Vulnerable to Cache Poisoning
US-CERT is aware of deficiencies
in the DNS protocol. Implementations of this protocol may leave the
affected system vulnerable to DNS cache poisoning attacks. If an
attacker can successfully conduct a cache poisoning attack, they may be
able to cause a nameserver's clients to contact the incorrect, and
possibly malicious, hosts for particular services. This may allow an
attacker to obtain sensitive information or mislead users into
believing they are visiting a legitimate website.
US-CERT encourages users to review "VU#800113
- Multiple DNS implementations vulnerable to cache poisoning" and apply
any necessary solutions listed in that document to help mitigate the
US-CERT will provide additional information as it becomes available.
Filed under: Alerts