Jump to content

Recommended Posts

Posted

Source:

http://blog.wired.com/27bstroke6/2008/07/dns-exploit-in.html

Check your DNS servers at:

http://www.doxpara.com/

Do not assume your ISP knows about this either. I emailed the contacts listed in CS Loxinfo's record at APNIC this morning as the above site stated

Your name server, at 203.146.237.212, appears vulnerable to DNS Cache Poisoning.

and just 1 hour later I received the reply

Dear Sir, I just patched my DNS. Please you check this problem again. Best Regards, DNS Admin

Now the site states

Your name server, at 203.146.237.212, appears to be safe, but make sure the ports listed below aren't following an obvious pattern.

I guess the DNS admin didn't do any testing, considering he had the patch up and running on their production servers within an hour of my email. :o

Perhaps they'll find out about the serious performance hit by tomorrow. :D

I also wonder if he cleared the cache. :D

Anyway, if you run the check, and it comes up as being vulnerable, don't assume your ISP knows anything about this, as ridiculous as that sounds.

Cheers, and be safe.

Posted

The fix for this (at the Windows platform) has been published more then two weeks ago, of course good administrators make sure that their servers are patched well within this time frame, some obviously don't.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.



×
×
  • Create New...