Force10 Networks, Inc. Information for VU#800113

Multiple DNS implementations vulnerable to cache poisoning



Vendor Statement

Force10 Networks acknowledges that some of the platforms are vulnerable,
but to a limited extent. For further details on the impact, workaround and
available fix, please visit our website at 

to view the complete text of the Field Alert. The document is titled
Security advisory-VU#800113

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References



Note that the statement above reflects a change from the original vendor statement provided prior to publication. This also reflects a change from status "Not Vulnerable" to "Vulnerable". The original vendor statement was:

Force10 Networks' FTOS and SFTOS are unaffected by this vulnerability. Neither operating systems implement a caching DNS server or stub resolver.

If you have feedback, comments, or additional information about this vulnerability, please send us email.