[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
SANS: DNS Bug Now Public?
- Subject: SANS: DNS Bug Now Public?
- From: Jon.Kibler at aset.com (Jon Kibler)
- Date: Tue, 22 Jul 2008 08:40:32 -0400
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SANS is reporting that Kaminsky's DNS bug may be now being exploited in
the wild. See:
http://isc.sans.org/diary.html?n&storyid=4765
Jon Kibler
- --
Jon R. Kibler
Chief Technical Officer
Advanced Systems Engineering Technology, Inc.
Charleston, SC USA
o: 843-849-8214
c: 843-224-2494
s: 843-564-4224
My PGP Fingerprint is:
BAA2 1F2C 5543 5D25 4636 A392 515C 5045 CF39 4253
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iEYEARECAAYFAkiF1T8ACgkQUVxQRc85QlMN1ACfTR8oJRy2V27+c5PjERcUjgIU
evAAn1sDR9xMc1bEmTeygXl7QkF9er2T
=eqbc
-----END PGP SIGNATURE-----
==================================================
Filtered by: TRUSTEM.COM's Email Filtering Service
http://www.trustem.com/
No Spam. No Viruses. Just Good Clean Email.