|
Dan Kaminsky, an American internet security specialist who uncovered the bug, has been working with major technology companies including Microsoft and Cisco to issue software patches to prevent attacks from working.
“This is the largest synchronised security update in the history of the internet. The severity of this bug is shown by the number of those who are on board with the patches,” Kaminsky said.
The flaw exploits the internet’s address mechanism, known as the Domain Name System (DNS). The glitch allows hackers to inject themselves into the process, intercepting the name entered by the user and mapping it to a different internet address than the one intended.
This would potentially allow criminals to redirect web users to phishing websites even if they had entered the correct address in the first place.
Phew! I hope the good guys get this sorted out – first.
Sent to Steve Gibson for analysis on Security Now 😀
M
has led to some of the technology industry’s largest companies scrambling to come up with a solution before hackers discover how to exploit the flaw.
lol
it’s only been this way since the start
Thanks for helping to alert hackers to the nature of the exploits.
Heck of a job!!!
Anyway, I’m sure that this is all just a ruse to allow the planting of some NSA surveillance code into the ‘Net. How many years has this flaw been in place and just NOW it’s being discovered? And the Hackers, which are magnitudes smarter and quicker then the establishment guys, didn’t discover it first?
LOL! Give me a break!
The FISA/Telecom immunity bill just got passed, after all.
Wake-up folks!
Old News!
A quick look in Wikipedia will give you more information. The first three external links at the end of the article are from 2007.
RTFA #4 – yeah, cache poisoning has, in fact, been around since the early 90’s. And your point is…?
The article is about a new response to the newest variant.
Yea right, the prison guards are going to inform all the inmates that there is a security flaw.
Off course it’s safe to do on line banking, etc, on line! Ouch!
BTW – if you’ve applied the Microsoft “patch” and run ZoneAlarm, you probably aren’t reading this comment.
Folks are reporting, this morning, that the combination won’t allow them access to the Web – unless they reduce the protection level settings in ZoneAlarm.
Microsoft says they’ve had no reports of any problem.
http://tinyurl.com/6xrye2
Umm, I remember reporting on this YEARS ago. Not exactly news.
the guys at TWiT Live (Leo and Randal Schwartz)discussed this article yesterday.
In short, if you switch to using OpenDNS as your DNS server you are safe.
Or if you visit http://www.doxpara.com/ you can check your DNS to see if you are vulnerable to this attack.
The company Phorm is doing this actively in the top three ISPs in the UK and has been for twelve months.
Seems like web sites could advertise their IP addresses, so users could use them instead of the dotcom URL. It would be practical for sites you bookmark, especially banking, etc. Just be sure you get the IP address from the real bank.
Yeah its called altering the hosts file. Thats been around for awhile now. Also you can use this “flaw” to prevent yourself from going to bad websites.
Also Steve already talked about this http://www.grc.com/sn/notes-045.htm