Force10 Networks, Inc. Information for VU#800113
Multiple DNS implementations vulnerable to cache poisoning
- Vendor Information Help Date Notified: 21 Apr 2008
- Statement Date: 09 Jul 2008
- Date Updated: 08 Oct 2008
Force10 Networks acknowledges that some of the platforms are vulnerable,
but to a limited extent. For further details on the impact, workaround and
available fix, please visit our website at
to view the complete text of the Field Alert. The document is titled
The vendor has not provided us with any further information regarding this vulnerability.
Note that the statement above reflects a change from the original vendor statement provided prior to publication. This also reflects a change from status "Not Vulnerable" to "Vulnerable". The original vendor statement was:
Force10 Networks' FTOS and SFTOS are unaffected by this vulnerability. Neither operating systems implement a caching DNS server or stub resolver.
If you have feedback, comments, or additional information about this vulnerability, please send us email.