DNS Protocol Flaw: Don`t Panic, Just Patch

July 14, 2008 – 4:11 PM

The exploit discovered by IOActive’s Dan Kaminsky, takes advantage of a fundamental flaw in the DNS (Domain Name Server) protocol. Organizations should move quickly to patch vulnerable DNS servers against a flaw revealed last week. Dan Kaminsky said the bug can be exploited to redirect Internet traffic, but the problem has been solved by implementing port randomization.

Despite the fact that few people know all the technical details of the bug affecting domain name servers that security researcher Dan Kaminsky reported last week, there are no shortage of opinions on it.

As we all should know by now, the exploit discovered by Kaminsky, director of penetration testing for IOActive, takes advantage of a fundamental flaw in the DNS (Domain Name Server) protocol. While Kaminsky is tight-lipped about the specific technical details of the bug, which can be exploited to redirect Internet traffic, he has said the problem has been solved by implementing port randomization.

Source:
http://www.eweek.com/c/a/Security/DNS-Flaw-Dont-Panic-Just-Patch/

You must be logged in to post a comment.