On Thu, 22 Mar 2007 11:35:18 +0100 Andres Tarasco wrote:
By default, most Microsoft DNS servers integrated with active directory allow
insecure dynamic updates for dns records.
This statement is way too broad. Creating an AD-integrated zone in Windows
Server 2003 does create a secure updates
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: dhcpd dynamic DNS format string vulnerability
Advisory number
e day, you need only to
attack not to
listen to the last whispers of a dying server. You just don't want to be logged,
do you ? :
All Dynamic DNS services that I know of are vulnerable .
I am not going to include code, but it is a trivial task to spoof a packet
(UDP or TCP) with RR data in t
Sorry, hit enter in the first one thinking it would tab
down.
Here it is:
Currently most inplementations of Dynamic DNS or "DDNS" rely
upon only client IP addresses in an access list for
authentication. The impact is that anyone can spoof update
packets from a false sour