Bugtraq mailing list archives
Re: [bugtraq] Re: [Full-disclosure] CAU-EX-2008-0002: Kaminsky DNS Cache Poisoning
From: "Tuc at T-B-O-H.NET" <ml () t-b-o-h net>
Date: Fri, 25 Jul 2008 16:09:07 -0400 (EDT)
On FreeBSD 7.0-STABLE (updated on Fri May 23) it fails to create raw socket even when running as root: ... [-] This module is configured to use a raw IP socket. On Unix systems, only the root user is allowed to create raw sockets.Please run the framework as root to use this module. [*] Attempting to inject poison records for example.com.'s nameservers into 202.72.241.4:55088... [-] Auxiliary failed: undefined method `sendto' for nil:NilClass
Thats a known issue. May be on any *BSD system, not sure about Windows. The authors were alerted, but don't have a time to resolution set. I guess Linux is the default of the hack platform. ;) Tuc/TBOH
Current thread:
- CAU-EX-2008-0002: Kaminsky DNS Cache Poisoning Flaw Exploit I)ruid (Jul 24)
- Re: [Full-disclosure] CAU-EX-2008-0002: Kaminsky DNS Cache Poisoning Flaw Exploit Ganbold (Jul 25)
- Re: [bugtraq] Re: [Full-disclosure] CAU-EX-2008-0002: Kaminsky DNS Cache Poisoning Tuc at T-B-O-H.NET (Jul 25)
- Re: [Full-disclosure] CAU-EX-2008-0002: Kaminsky DNS Cache Poisoning Flaw Exploit Ganbold (Jul 25)