Ventsyslav Vassilev wrote, on 30/07/08 16:26:
>> ; <<>> DiG 9.2.1 <<>> current.cvd.clamav.net
> 
> First, you may want to upgrade your BIND version!
> This one is vulnerable to cache poisoning!
> http://www.kb.cert.org/vuls/id/800113
> 
Well they all are really: it's just got somewhat more difficult to do the 
poisoning with the recent patches for transaction ID and source port 
randomization.

Roll on DNSSEC and friends.

Cheers,
Stu.

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to