MDVSA-2008:139 -- Mandriva bindID: oval:org.secpod.oval:def:301658 | Date: (C)2012-01-07 (M)2023-12-07 |
Class: PATCH | Family: unix |
A weakness was found in the DNS protocol by Dan Kaminsky. A remote attacker could exploit this weakness to spoof DNS entries and poison DNS caches. This could be used to misdirect users and services; i.e. for web and email traffic . This update provides the latest stable BIND releases for all platforms except Corporate Server/Desktop 3.0 and MNF2, which have been patched to correct the issue.
Platform: |
Mandriva Linux 2007.1 |
Mandriva Linux 2008.1 |
Mandriva Linux 2008.0 |