<html>
<head>
<style>
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
FONT-SIZE: 10pt;
FONT-FAMILY:Tahoma
}
</style>
</head>
<body class='hmmessage'>
<br><br>> Date: Tue, 22 Jul 2008 18:05:27 +0100<br>> From: simon@thekelleys.org.uk<br>> To: agcme@hotmail.com<br>> CC: dnsmasq-discuss@lists.thekelleys.org.uk<br>> Subject: Re: [Dnsmasq-discuss] Question about DNS vunlerabiltiy in dnsmasq<br>> <br>> A C wrote:<br>> > I'm running dnsmasq 2.35 but it's on an embedded system and the package <br>> > manager hasn't created a new version yet. I wanted to know how <br>> > vulnerable I was to the recent security alert regarding DNS and whether <br>> > there's a potential workaround that I could put in place for now.<br>> > <br>> <br>> "How vulnerable" is a difficult question. AFAIK, the attack hasn't been <br>> seen in the wild, and it's assumed that the Bad Guys don't know it, so <br>> you're absolutely safe until Dan Kaminsky spills the beans (August?)<br>> <br>> Does that give you enough time to get a new version in place?<br>> <br>> Simon.<br><br>Well, not really. I don't have the ability to generate a package for the embedded system so I'm at the mercy of the package maintainer. I've already mailed them to see if they'll update but it may be a while and I was hoping there was a reasonable workaround that could be implemented in the interim or until I can get a replacement router in place that doesn't require package management.<br><br /><hr />Use video conversation to talk face-to-face with Windows Live Messenger. <a href='http://www.windowslive.com/messenger/connect_your_way.html?ocid=TXT_TAGLM_WL_Refresh_messenger_video_072008' target='_new'>Get started.</a></body>
</html>