DNS Poisoning

security researcher Dan Kaminsky who works at security services firm IOActive, said this week at BlackHat that the time may have come for IT vendors and users to consider broad adoption of the more-permanent security protections offered by DNS Security Extensions, or DNSSEC, technology.

The cache-poisoning flaw was publicly disclosed last July and after several months was discovered by Kaminsky, who first notified IT vendors to give them time to develop a fix. When he finally detailed the vulnerability, Kaminsky said it existed at the DNS protocol level and was so ubiquitous that virtually every domain name server resolving IP addresses on the Internet was vulnerable to attack.

The flaw could be used by attackers to spoof DNS traffic, potentially enabling them to redirect Web traffic and e-mail messages to systems under their control. Other security researchers said that although the concept behind such attacks had been well understood for some time, Kaminsky demonstrated an extremely effective way in which the attacks could be carried out.

You can read more about it here.

Notify of
Newest Most Voted
Inline Feedbacks
View all comments

[…] Sectech we have published the DNS cache-poisoning flaw this vulnerability allow a hackers to redirect Web traffic and e-mails to systems under their […]


[…] cache poisoning has become very common after Dan Kaminsky two years ago discovered and alerted of a serious security vulnerability that could leave banks, […]