[olug] DNS exploit VU#800113 - should we be alarmed?
Will Langford
unfies at gmail.com
Wed Jul 16 20:06:26 UTC 2008
> Update packages for Windows, RPM-based distros and DEB-based distros are
> cryptographically signed with either X.509 certificates or PGP/GPG.
Touche :). I'll concede the point for alot of software, but also note
that alot of software doesn't check for validity of updates it pulls
down.
Or, another possible issue: I've seen earthlink cause any failed
lookups result in IP addresses of their own 'we think we can help you'
servers. Similarly, if google, paypal, yahoo, ms live, etc were
spoofed, phishing is alot easier to look much more realistic :)... or
just... annoying web experience in general is easier to inflict.
Although, I can imagine some prankster doing a mass-goaste prank
against many people by poisoned dns cache's for popular sites :).
-Will
More information about the OLUG
mailing list