This blog has a good overview and some relevant info in the comments
(a lot of bs in there too though):

<http://securosis.com/2008/07/08/dan-kaminsky-discovers-fundamental-issue-in-dns-massive-multivendor-patch-released/>

On Wed, Jul 9, 2008 at 11:23 AM, Micheal Espinola Jr
<[EMAIL PROTECTED]> wrote:
> Affected systems include both client and server systems [that
> implement DNS caching and stub resolution], and any other networked
> systems that include this functionality.
>
> * US-CERT (TA08-190B) Multiple DNS implementations vulnerable to cache
> poisoning -
>       <http://www.us-cert.gov/cas/techalerts/TA08-190B.html>
> * Microsoft Security Bulletin MS08-037 -
>       <http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx>
>
> --
> ME2
>
> ~ Upgrade to Next Generation Antispam/Antivirus with Ninja!    ~
> ~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm>  ~
>




-- 
ME2

~ Upgrade to Next Generation Antispam/Antivirus with Ninja!    ~
~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm>  ~

Reply via email to