Sunday, August 3, 2008

Multiple Vendors Vulnerable to DNS Cache Poisoning

Multiple vendor DNS protocol implementations could allow a remote attacker to poison the DNS cache.  Patches that resolve the vulnerability on the DNS may be rendered ineffective if the DNS is behind a NAT device that does not randomize ports. Public exploit code was made available on July 24, 2008.  At the time of this update, neither X-Force nor IBM MSS has witness any active exploitation nor the integration of this exploit into any exploit toolkits. Read More

Ill-fated acquisition results in customers being migrated elsewhere for support Read More

MS online division to be re-jigged after Johnson's departure Read More

Weakening economy won't dampen growth Read More

Dutch Police have arrested two brothers suspected of running a botnet containing up to 100,000 computers Read More

Carl Jongsma speculates on the possibility Read More

Jobs to be shifted to offshore centres of excellence Read More

The Microsoft Dynamics GP is vulnerable to four heap and stack-based buffer overflows. A remote attacker could overflow the buffer and execute arbitrary code or gain control of the affected system by sending malicious queries to the Distributed Process Server or Distributed Process Manager. Read More

No comments: