Friday, September 26, 2008

Multiple Vendors Vulnerable to DNS Cache Poisoning

Multiple vendor DNS protocol implementations could allow a remote attacker to poison the DNS cache.  Patches that resolve the vulnerability on the DNS may be rendered ineffective if the DNS is behind a NAT device that does not randomize ports. Public exploit code was made available on July 24, 2008.  At the time of this update, neither X-Force nor IBM MSS has witness any active exploitation nor the integration of this exploit into any exploit toolkits. Read More

Hamilton's NetValue partners with US software giant Read More

Big step forward for the Christchurch company Read More

Oracle's development chief discussed cloud computing strategy Read More

Oracle WebLogic Server (formerly known as BEA WebLogic Server) is vulnerable to a buffer overflow, which would cause a denial of service and potentially remote code execution. Read More

Second Open Source Awards held in Wellington last night Read More

Ex-Gen-i Australia head to take up CEO role Read More

No comments: