Multiple vendor DNS protocol implementations could allow a remote attacker to poison the DNS cache. Patches that resolve the vulnerability on the DNS may be rendered ineffective if the DNS is behind a NAT device that does not randomize ports. Public exploit code was made available on July 24, 2008. At the time of this update, neither X-Force nor IBM MSS has witness any active exploitation nor the integration of this exploit into any exploit toolkits. Read More
Ill-fated acquisition results in customers being migrated elsewhere for support Read More
MS online division to be re-jigged after Johnson's departure Read More
Weakening economy won't dampen growth Read More
Dutch Police have arrested two brothers suspected of running a botnet containing up to 100,000 computers Read More
Carl Jongsma speculates on the possibility Read More
Jobs to be shifted to offshore centres of excellence Read More
The Microsoft Dynamics GP is vulnerable to four heap and stack-based buffer overflows. A remote attacker could overflow the buffer and execute arbitrary code or gain control of the affected system by sending malicious queries to the Distributed Process Server or Distributed Process Manager. Read More
Sunday, August 3, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment