[AusNOG] DNS Cache Poisoning Vulnerability

Noel Butler noel.butler at ausics.net
Fri Aug 8 10:17:35 EST 2008


On Fri, 2008-08-08 at 09:36, Craig Askings wrote:

> Hi Brent,
> 
> There are two parts to the cache poisoning vulnerability, lack of source
> port randomisation and poor transaction ID randomisation.
> 
> Those servers have been patched to fix the transaction ID randomisation
> problem, but not the source port issue. Some tools test both, some don't.
> But having both fixed is ideal.
> 
> If anyone has found source port randomisation patch for Bind 9.2 please
> contact me of list.
> 


EH?  9.2 was EOL  last September



-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20080808/a2fe4eef/attachment.html>


More information about the AusNOG mailing list