FYI
Paul ---------- Forwarded message ---------- Date: Tue, 18 Oct 2011 17:14:56 From: Roee Hay <ro...@il.ibm.com> To: dailydave <dailyd...@lists.immunityinc.com> Subject: [Dailydave] DNS Poisoning via Port Exhaustion X-Spam-Flag: NO Hey, Today we are releasing a very interesting whitepaper which describes a DNS poisoning attack against stub resolvers. It discloses two vulnerabilities: 1. A vulnerability in Java (CVE-2011-3552, CVE-2010-4448) which enables remote DNS poisoning using Java applets. This vulnerability can be triggered when opening a malicious webpage. A successful exploitation of this vulnerability may lead to disclosure and manipulation of cookies and web pages, disclosure of NTLM credentials and clipboard data of the logged-on user, and even firewall bypass. 2. A vulnerability in multiuser Windows environments which enables local DNS cache poisoning of arbitrary domains. This vulnerability can be triggered by a normal user (i.e. one with non-administrative rights) in order to attack other users of the system. A successful exploitation of this vulnerability may lead to information disclosure, privilege escalation, universal XSS and more. Whitepaper: http://bit.ly/q31wSq A blog post with video demos: http://bit.ly/qu4Ez7 Roee Hay <ro...@il.ibm.com>, IBM Rational Application Security Research Group Yair Amit <yai...@gmail.com> _______________________________________________ Dailydave mailing list dailyd...@lists.immunityinc.com https://lists.immunityinc.com/mailman/listinfo/dailydave _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop