Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

DNS cache poisoning bugs hits Symantec shops
The Register ^ | March 8, 2005 | John Leyden

Posted on 03/08/2005 9:07:44 AM PST by Disambiguator

Crackers are using a security vulnerability in Symantec's enterprise products to redirect surfers to websites hosting malicious code. The main vector of the DNS cache poisoning attack, detected by the SANS Institute's Internet Storm Centre on 4 March, has been traced back to a vulnerability affecting Symantec firewalls with DNS caching.

Symantec has issued a hotfix for its Symantec Enterprise Firewall and Enterprise Security Gateway appliance products. Even users who applied a July 2004 fix to correct a previous DNS cache poisoning problem are advised to revisit the issue. A few non-Symantec users reported similar issues, so the problem is not solely confined to Symantec firewall users. The SANS Institute, which is tracking the issue, has issued general advice on dealing with the problem.

As a result of the attack, enterprise users visiting popular domain names such as google.com, ebay.com, and weather.com were redirected to servers hosting malware (the ABX toolbar spyware). The spyware was loaded using an ActiveX-controlled blocked by XP SP2, but other Windows shops will have to clean up client machines as well as patch enterprise systems.


TOPICS: Business/Economy; Extended News; Miscellaneous
KEYWORDS: dns; internet; malware; microsoft; symantec; windows
If anyone has seen any strange behavior with their browsers of late, this might be the cause. Here is the link to the SANS Institute info on this issue: http://isc.sans.org/diary.php?date=2005-03-04
1 posted on 03/08/2005 9:07:50 AM PST by Disambiguator
[ Post Reply | Private Reply | View Replies]

To: Disambiguator

> Crackers are using a security vulnerability in
> Symantec's enterprise products ...

As the protection products become more effective, they
themselves will become targets for crackers.

I had an event on a home PC a couple of weeks ago that
suggested someone is honing an attack on Norton Anti-Virus.

An alert popped that a Symantec DLL had been discovered to
be infected with Bloodhound.w32.4, which is a placeholder
name for a threat Symantec hasn't properly identified yet.

NAV wouldn't run, because another Sym DLL had been
completely destroyed, and I couldn't update my definitions
because the local copy of my subscription expiration date
had been reset to circa 1897!

Uninstalling NAV, reinstalling from CD, and updating defs
appeared to clean it all up. A full scan found nothing.
ZoneAlarm hasn't reported anything trying to phone home.

Unfortunately, I didn't record enough detail to file a
report with Sym.


2 posted on 03/08/2005 9:23:08 AM PST by Boundless
[ Post Reply | Private Reply | To 1 | View Replies]

To: Disambiguator

Reason # 238,987 not to use ANY 'blows product.

"It just sucks"


3 posted on 03/08/2005 9:24:08 AM PST by sarah_f ( Know Islam, Know Terror.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Boundless

"been reset to circa 1897! "

You can reset the date with the "date" command in a command prompt window. The lack of update due to a date issue is easily overcome with a temporary date alteration.


4 posted on 03/08/2005 9:58:55 AM PST by oldcomputerguy
[ Post Reply | Private Reply | To 2 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson