Nytro Posted October 19, 2011 Report Posted October 19, 2011 DNS Poisoning via Port ExhaustionHey,Today we are releasing a very interesting whitepaper which describes a DNSpoisoning attack against stub resolvers.It discloses two vulnerabilities:1. A vulnerability in Java (CVE-2011-3552, CVE-2010-4448) which enables remote DNS poisoning using Java applets. This vulnerability can be triggered when opening a malicious webpage. A successful exploitation of this vulnerability may lead to disclosure and manipulation of cookies and web pages, disclosure of NTLM credentials and clipboard data of the logged-on user, and even firewall bypass.2. A vulnerability in multiuser Windows environments which enables local DNS cache poisoning of arbitrary domains. This vulnerability can be triggered by a normal user (i.e. one with non-administrative rights) in order to attack other users of the system. A successful exploitation of this vulnerability may lead to information disclosure, privilege escalation, universal XSS and more. Whitepaper: http://bit.ly/q31wSq A blog post with video demos: IBM Rational Application Security Insider: DNS poisoning via Port ExhaustionDownload:http://blog.watchfire.com/files/dnsp_port_exhaustion.pdfRoee Hay <roeeh () il ibm com>, IBM Rational Application Security Research GroupYair Amit <yairam () gmail com>Sursa: Full Disclosure: DNS Poisoning via Port Exhaustion Quote