Researchers have demonstrated yet another variant of the SAD DNS cache poisoning attack that leaves about 38% of the domain name resolvers vulnerable, enabling attackers to redirect traffic originally destined to legitimate websites to a server under their control.
“The attack allows an off-path attacker to inject a malicious DNS record into a DNS cache,” University of California researchers
Posted inTechnology News