DNS cache poisoning is not just for web browsers anymore. According to researcher Dan Kaminsky, there are a variety of programs that make requests of DNS servers, including games and a number of desktop applications.
In a presentation at the Back Hat conference in Las Vegas, Kaminsky said that although more than 70 percent of all vulnerable systems have been patched, “We are entering a third age of security research, where all networked apps are fair game."
He added that just because severs are behind firewalls, they are not necessarily immune from exploits based on the flaw.
Internal networks are not at all safe, both from the effects of Java, and from the fact that internal routing could be influenced by external activity, he said.
In fact, he said, “the whole concept of the fully internal network may be broken – there are just so many business relationships.”
In responding to questions at a press conference after his presentation, Kaminsky said, “I think at this point most users likely will be more unsafe at work then when they're home.”
He added: “I think that in the long term architecturally we need to stop assuming the network is friendly: Every network is a hostile network.”
See original article on scmagazineus.com
BLACK HAT: DNS flaw could spread beyond the browser
By Chuck Miller on Aug 7, 2008 4:57PM