Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.
Symantec Fixes DNS Cache Poisoning Problem
Symantec releases updated hotfixes for several of its gateway products that suffer from a vulnerability hackers have already used to poison DNS caches and redirect users to malicious sites.
March 16, 2005
1 Min Read
Symantec on Tuesday released updated hotfixes for several of its gateway products that suffer from a vulnerability hackers have already used to poison DNS caches and redirect users to malicious sites.
Although Symantec released patches earlier this month for its Gateway Security 5300 and 5400 Series, the Windows and Solaris editions of its Symantec Enterprise Firewall, 7.0.x and 8.0, and its Symantec VelociRaptor, the new fixes "further hardens the DNSd for protection against an additional potential vector identified by Symantec engineers during our post-analysis," said the Cupertino, Calif.-based security firm in a bulletin on its Web site.
The DNS cache poisoning incident began March 4; the same day, the Internet Storm Center noted that it had received reports of users being redirected from popular sites such as Google and eBay, to a malicious page where spyware and adware was being distributed.
Damage was limited, however; ISPs blocked the malicious sites soon after the redirect was discovered.
"Non-Symantec product users reported similar activity, so this malicious action appears not to have been limited to Symantec security gateway products," the company said.
The fixes are available from the Enterprise Support site.
You May Also Like
The Total Economic Impact™ Of Fortinet NGFW For Data Center And AI-Powered FortiGuard Security Services Solution Study
Edge Computing Bridges IT and OT People, Process, and Technology
*State of ITSM in Retail
Solution Brief: Fortinet FortiFlex Delivers Usage-Based Security Licensing That Moves at the Speed of Digital Accelerationâ€‹
Checklist: Top 6 Considerations to Optimize Your Digital Acceleration Security Spend