Ventsyslav Vassilev wrote, on 30/07/08 16:26: >> ; <<>> DiG 9.2.1 <<>> current.cvd.clamav.net > > First, you may want to upgrade your BIND version! > This one is vulnerable to cache poisoning! > http://www.kb.cert.org/vuls/id/800113 > Well they all are really: it's just got somewhat more difficult to do the poisoning with the recent patches for transaction ID and source port randomization.
Roll on DNSSEC and friends. Cheers, Stu. _______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://www.clamav.net/support/ml
