[Owasp-Mumbai] DNS poisoning - wide impact

Secure Scorp securescorp at gmail.com
Thu Jul 10 23:16:07 EDT 2008


 This has also affected loads of network security devices from Cisco
and Juniper :-(

http://secunia.com/advisories/31012/
http://secunia.com/advisories/30979/

Thanks,
Aditya Govind Mukadam

On Thu, Jul 10, 2008 at 5:59 PM, chintan dave <davechintan at gmail.com> wrote:
> It was published on US cert yesterday, if i m not wrong.
> http://www.us-cert.gov/cas/techalerts/TA08-190B.html
>
> On Thu, Jul 10, 2008 at 5:27 AM, Kamat, Jitesh <Jitesh.Kamat at gs.com> wrote:
>>
>> Most of you are probably already aware of the recent DNS poisoning
>> vulnerability (read more here:
>> http://www.darkreading.com/document.asp?doc_id=158442&WT.svl=news1_2)
>> that was discovered by Dan Kaminsky. To remediate this one , major
>> players in the industry have collaborated - this is an impressive
>> effort.
>>
>> Readup Kaminsky's blog which also has a quick DNS checker to find if
>> your own firm's DNS is vulnerable: http://www.doxpara.com/?p=1162
>>
>>  - Jitesh Kamat
>> _______________________________________________
>> OWASP-Mumbai mailing list
>> OWASP-Mumbai at lists.owasp.org
>> https://lists.owasp.org/mailman/listinfo/owasp-mumbai
>
>
>
> --
> Warmest Regards,
> Chintan Dave,
> Risk Advisory Services,
> KPMG - Singapore
>
> http://www.linkedin.com/in/chintandave
>
> _______________________________________________
> OWASP-Mumbai mailing list
> OWASP-Mumbai at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-mumbai
>
>


More information about the OWASP-Mumbai mailing list