bind를 비롯한 각종 dns server 프로그램의 심각한 *DNS Cache Poisoning Attack
취약점이 발견되었습니다.
The DNS protocol, as implemented in
(1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1;
(2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations
allow remote attackers to spoof DNS traffic via certain cache poisoning techniques against recursive resolvers,
related to insufficient randomness of DNS transaction IDs and source ports,
aka "DNS Insufficient Socket Entropy Vulnerability."
관련링크 :
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
http://www.kb.cert.org/vuls/id/800113
* DNS Cache Poisoning Attack
http://en.wikipedia.org/wiki/DNS_cache_poisoning
The DNS protocol, as implemented in
(1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1;
(2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations
allow remote attackers to spoof DNS traffic via certain cache poisoning techniques against recursive resolvers,
related to insufficient randomness of DNS transaction IDs and source ports,
aka "DNS Insufficient Socket Entropy Vulnerability."
관련링크 :
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
http://www.kb.cert.org/vuls/id/800113
* DNS Cache Poisoning Attack
http://en.wikipedia.org/wiki/DNS_cache_poisoning
'Security' 카테고리의 다른 글
zeroboardXE CSRF (Cross-site request forgery) 보안 취약점 (0) | 2008.09.02 |
---|---|
최근 웹사이트 공격 유형 #2 (3) | 2008.07.29 |
Safari update fixes "carpet bomb" flaw (0) | 2008.06.25 |
보안 관련 사이트 (mailling) (0) | 2008.06.16 |
최근 웹사이트 공격 유형 (2) | 2008.05.09 |