Avaya, Inc. Information for VU#800113
Multiple DNS implementations vulnerable to cache poisoning
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Avaya has published Avaya Security Advisory ASA-2008-288 in response to this issue. Users are encouraged to review this advisory and apply the patches it describes.
If you have feedback, comments, or additional information about this vulnerability, please send us email.