|Main Archive Page > Month Archives > full-disclosure-uk archives|
On Sat, 09 Aug 2008 20:59:15 BST, n3td3v said:
> Reports coming out of blog land and onto n3td3v - Google Groups:
> Emergency DNS Patch Still Vulnerable, Proves Russian Physicist
*yawn*. It was already *known* that even after patching, the vulnerability was still there. All the port-randomization stuff did was make it an order of 64K or so harder to exploit. That's why DNSSEC was recommended as the *real* fix for this problem.