On Sat, 09 Aug 2008 20:59:15 BST, n3td3v said: > Reports coming out of blog land and onto n3td3v - Google Groups: > > Emergency DNS Patch Still Vulnerable, Proves Russian Physicist *yawn*. It was already *known* that even after patching, the vulnerability was still there. All the port-randomization stuff did was make it an order of 64K or so harder to exploit. That's why DNSSEC was recommended as the *real* fix for this problem.
Attachment:
pgp6keX1uCLkA.pgp
Description: PGP signature
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/