Re: "BIND 9 DNS Cache Poisoning" by Amit Klein (Trusteer)

看板Bugtraq作者時間18年前 (2007/07/28 03:30), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串9/10 (看更多)
> "it's not like this hasn't been reported, and fixed, many times by many > others" - so if it's fixed so many times, how come it was still vulnerable, > and ISC had to issue their patches? Because its just a 16-bit field. DNS is broken. Cache poisoning will happen. Those are the facts on the ground. The only argument left is the degree of brokenness. > -Amit Tim Newsham http://www.thenewsh.com/~newsham/
文章代碼(AID): #16gaVj00 (Bugtraq)
討論串 (同標題文章)
完整討論串 (本文為第 9 之 10 篇):
文章代碼(AID): #16gaVj00 (Bugtraq)