Updates on DNS Poisoning...
A new day has come and as you could notice, we are still on Yellow Infocon Level.
Over the last few days we have been observing some interesting stuff on the DNS poisoning topic.
Something new that we could update is that (Thanks Kyle) according to Microsoft documentation, it appears that Windows 2000 DNS server with SP3+ has the registry key to protect against DNS cache poisoning by default. But we are still trying to validate this information and ensure that this is always the case.
We are researching and trying to get more details about this and post here as soon as possible. Stay tuned!
One of our readers in Peru sent an interesting story about DNS problems in Peru. According our the news, looks like all .gob.pe and .com.pe were unavailable today in Peru. At this time, we don't have any proof that this could be related to the DNS poisoning topic.
Mailbag and other stories...
Thanks to our Finnish reader Juha-Matti, that reminded us that there is life besides DNS Poisoning...
Btw, there are a lot of new stuff around.
-Remember the MS04-045? Well, looks like we have a public exploit available. Didn't patch yet? Need another reason?
- Sybase ASE Multiple vulnerabilities - NGS Software released an advisory about six security flaws in Sybase Adaptive Server Enterprise. Patches available!
- Looks like the Rootkit detectors are now the hot stuff. After the one from sysinternals, and F-secure Black Light, now SecuriTeam recommends a new one, called Klister. I didnt test them yet, but if anyone would like to share experiences, feel free to email me.
Handler on Duty: Pedro Bueno (pbueno /AT/isc.sans.org)
Apr 6th 2005
Apr 6th 2005
1 decade ago