Author Topic: cybersecurity tremors  (Read 509 times)

0 Members and 1 Guest are viewing this topic.

Plane

  • Hero Member
  • *****
  • Posts: 26993
    • View Profile
  • Liked:
  • Likes Given: 0
cybersecurity tremors
« on: August 03, 2008, 04:16:44 AM »
http://www.gcn.com/print/27_18/46738-1.html

If a seismograph were monitoring cybersecurity tremors, it certainly would have spiked earlier this month with the news that a pervasive vulnerability had been discovered that could allow hackers to redirect Internet traffic.

As Government Computer News’ William Jackson first reported July 8 (GCN.com Quickfind 1162), a number of vendors and security researchers have been scrambling secretly over the past six months to fix a design flaw in the Internet’s Domain Name System.

The DNS is the service that translates the text of a Web site name or an e-mail address and links the labels to their actual numeric IP addresses.

The flaw in the system was discovered by Dan Kaminsky, director of penetration testing at IOActive.

He noticed a weakness in the way random transaction numbers are created and assigned to identify DNS queries.

The flaw makes it possible for attackers to predict certain characteristics of the DNS query and spoof responses from a DNS server.

The result: Someone typing Citibank.com into their browser or e-mailing IRS.gov could be unwittingly sidetracked to a malicious Web site or mail server, or have the DNS cache on their system poisoned.

Details of the vulnerability won’t be released until next month’s annual Black Hat security conference that will give major DNS vendors a chance to install patches, hopefully before hackers can exploit the flaw.