Multiple vendor DNS protocol implementations could allow a remote attacker to poison the DNS cache. Patches that resolve the vulnerability on the DNS may be rendered ineffective if the DNS is behind a NAT device that does not randomize ports. Public exploit code was made available on July 24, 2008. At the time of this update, neither X-Force nor IBM MSS has witness any active exploitation nor the integration of this exploit into any exploit toolkits. Read More
Hamilton's NetValue partners with US software giant Read More
Big step forward for the Christchurch company Read More
Oracle's development chief discussed cloud computing strategy Read More
Oracle WebLogic Server (formerly known as BEA WebLogic Server) is vulnerable to a buffer overflow, which would cause a denial of service and potentially remote code execution. Read More
Second Open Source Awards held in Wellington last night Read More
Ex-Gen-i Australia head to take up CEO role Read More
Friday, September 26, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment