TITLE: HP-UX BIND4 DNS Cache Poisoning Vulnerability SECUNIA ADVISORY ID: SA20217 VERIFY ADVISORY: http://secunia.com/advisories/20217/ CRITICAL: Moderately critical IMPACT: Spoofing, Manipulation of data WHERE: >From remote OPERATING SYSTEM: HP-UX 11.x http://secunia.com/product/138/ DESCRIPTION: A vulnerability has been reported in HP-UX, which can be exploited by malicious people to poison the DNS cache. The vulnerability is caused due to an error in DNS BIND4 when it is configured to respond to recursive queries and the results are cached. This can be exploited in DNS cache poison attacks to e.g. redirect DNS clients to malicious or spoofed websites. The vulnerability has been reported in HP-UX B.11.00. SOLUTION: The vendor recommends disabling DNS recursion, or restrict access to affected systems. PROVIDED AND/OR DISCOVERED BY: Reported by vendor. ORIGINAL ADVISORY: HPSBUX02117 SSRT2400: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00668546 HPSBGN01156 SSRT2400: http://www4.itrc.hp.com/service/cki/docDisplay.do?docId=200000078581338 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------