Multiple Vendor DNS Protocol Insufficient Transaction ID Randomization DNS Spoofing Vulnerability

An attacker can use standard tools to exploit this issue.

UPDATE (July 30, 2008): There are reports of evidence of active exploit attempts in targeted attacks.

The following exploit code and exploit modules for the Metasploit framework are available:


 

Privacy Statement
Copyright 2010, SecurityFocus