DNS cache poisoning


Also found in: Dictionary, Medical, Wikipedia.

DNS cache poisoning

Injecting false information into the caches of the DNS system so that future requests are diverted to another site. In July 1997, Eugene Kashpureff inserted fraudulent information into the DNS, causing users going to the Network Solutions website to be rerouted to his Alternic site. See DNS cache, DNSSec, DNS hijacking, DNS and pharming.
References in periodicals archive ?
According to Johnson, most Web sites are vulnerable to DNS cache poisoning attacks, due to the prevalence on the Internet of DNS servers that can be exploited.
The first variant of DNS cache poisoning involves redirecting the nameserver of the attacker's domain to the nameserver of the target domain, then assigning that nameserver an IP address specified by the attacker.
We are pleased to introduce DNSSEC across our registry and DNS platform, protecting TLDs in our care from DNS cache poisoning and man-in-the-middle attacks, while maintaining consistency and convenience for registrars and their customers.
NitroGuard recently earned acclaim for successfully preventing DNS cache poisoning exploits using the "Kaminsky" DNS vulnerabilities, first detailed at BlackHat/DEFCON in August 2008.
Check Point IPS solutions preemptively protect against the two new threats through a suite of DNS cache poisoning protections available since 2003.
New Release Provides Intelligent, Layered Approach with Built-In "Defense in Depth" Against DNS Cache Poisoning
Top Layer Security, a leading global provider of Network Intrusion Prevention Systems (IPS), today announced that its IPS 5500 provides customers with proactive protection against attacks targeting the widely publicized, critical DNS Cache Poisoning Vulnerability (MS08-037, CVE-2008-1447), which could allow a remote attacker to insert malicious host entries into the vulnerable DNS server's cache, essentially hijacking an entire organization's outbound Internet traffic.
DNS cache poisoning is the first step in an attack sequence that spoofs a legitimate website to infect a user's computer with malicious code or steal a user's private credentials.
Arxceo's Ally ip100 anti-reconnaissance device prevents the spread of worms across the different segments of a network and fortifies network protocols, eliminating abuses such as covert channeling, DNS cache poisoning, fragmented packet 'exploit injections' and raw-frame Ethernet data leak transmissions.
The Ally ip100 is designed to protect small-to-medium-sized business networks, as well as an Enterprise's wireless access points and branch or remote offices from network reconnaissance, zero-day attacks, DNS cache poisoning and denial of service attacks.
Arxceo's Ally security devices prevent the spread of worms across the different segments of your network and fortifies network protocols, eliminating abuses such as covert channeling, DNS cache poisoning, fragmented packet 'exploit injections' and raw-frame Ethernet data leak transmissions.
Existing whitelists simply match what a user types to a literal static list of domain names, which fails to protect against a poisoned host file, DNS cache poisoning, or pharming.