surface Posted July 25, 2008 Share Posted July 25, 2008 Source: http://blog.wired.com/27bstroke6/2008/07/dns-exploit-in.html Check your DNS servers at: http://www.doxpara.com/ Do not assume your ISP knows about this either. I emailed the contacts listed in CS Loxinfo's record at APNIC this morning as the above site stated Your name server, at 203.146.237.212, appears vulnerable to DNS Cache Poisoning. and just 1 hour later I received the reply Dear Sir, I just patched my DNS. Please you check this problem again. Best Regards, DNS Admin Now the site states Your name server, at 203.146.237.212, appears to be safe, but make sure the ports listed below aren't following an obvious pattern. I guess the DNS admin didn't do any testing, considering he had the patch up and running on their production servers within an hour of my email. Perhaps they'll find out about the serious performance hit by tomorrow. I also wonder if he cleared the cache. Anyway, if you run the check, and it comes up as being vulnerable, don't assume your ISP knows anything about this, as ridiculous as that sounds. Cheers, and be safe. Link to comment Share on other sites More sharing options...
sjaak327 Posted July 25, 2008 Share Posted July 25, 2008 The fix for this (at the Windows platform) has been published more then two weeks ago, of course good administrators make sure that their servers are patched well within this time frame, some obviously don't. Link to comment Share on other sites More sharing options...
TopDogger Posted July 26, 2008 Share Posted July 26, 2008 That explains an awful lot with CSlox... Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now