Apple servers still vulnerable to DNS poisoning, experts warn

A month after a critical flaw in the Internet's Domain Name System was first reported, security experts are warning that updates introduced by Apple last week may not go far enough to combat the threat.

The DNS flaw allows an attacker to execute a cache poisoning attack, where traffic to a legitimate domain name is redirected to a malicious one after an attack on a DNS server.


The user can type in the correct name for a website, but get a fake one instead, which can enable a phishing attack. While some users might notice if they're directed to a odd-looking web page, many people could be successfully fooled.

Ncircle security analyst Andrew Storms warns, thought, that in the patch released in an attempt to address this problem last week, Apple has not implemented tough enough counter-measures to the threat.

"The current countermeasure to this DNS cache poisoning vulnerability is to introduce increased entropy by forcing randomization of the query ID and the source port," the experts said. "Essentially, making it all the more difficult to spoof the DNS response. However, it appears that Apple forgot something. The client libaries on my OSX 10.4.11 system, post patch install, still does not randomize the source port."

The experts warn that the problem is a huge potential dange for Apple, saying, "it matters most that they patch the client libraries since there are so few OS X recursive servers in use.

"The bottom line is that despite this update, it appears that the client libraries still aren't patched."




First Instance of New DNS Exploit Reported
Apple finally patches dangerous DNS flaw
Apple Reacts to Spoof Threats, Issues DNS Hotfix