QNX, Software Systems, Inc. Information for VU#800113

Multiple DNS implementations vulnerable to cache poisoning



Vendor Statement

    QNX Software Systems

    The DNS server process available with QNX Software Systems OS products
    prior to version 6.4.1 is vulnerable to the issues
    described in VU#800113.  This was corrected with version 6.4.1.

    Please contact your QNX representative for more information regarding
    older QNX releases and how to determine if you are
    using the affected binaries.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Vendor References



    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.