DNS Protocol Flaw: Don't Panic, Just Patch
The exploit, discovered by IOActive's Dan Kaminsky, takes advantage of a fundamental flaw in the DNS protocol. Organizations should move quickly to patch vulnerable DNS servers. Kaminsky says the bug can be exploited to redirect Internet traffic but the problem has been solved by implementing port randomization.Despite the fact that few people know all the technical details of the bug affecting domain name servers that security researcher Dan Kaminsky reported July 8, there is no shortage of opinions on it. As we all should know by now, the exploit discovered by Kaminsky, director of penetration testing for IOActive, takes advantage of a fundamental flaw in the DNS (Domain Name System) protocol. While Kaminsky is tight-lipped about the specific technical details of the bug, which can be exploited to redirect Internet traffic, he has said the problem has been solved by implementing port randomization.
"I've pinged at least a few customers, and I'm seeing very large tech firms already moving on this," Kaminsky told eWEEK via e-mail. He said he plans to unveil details of the vulnerability at the Black Hat conference in August in Las Vegas. "Realistically, they could move pretty fast if they were under active attack. I'm trying to give people a little more time to test than that, but we'll see what they can do with it."