	{"id":248,"date":"2008-08-05T10:21:47","date_gmt":"2008-08-05T09:21:47","guid":{"rendered":"http:\/\/blog.intego.com\/?p=248"},"modified":"2008-08-05T10:21:47","modified_gmt":"2008-08-05T09:21:47","slug":"everything-you-need-to-know-about-the-dns-vulnerability","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/","title":{"rendered":"Everything You Need to Know about the DNS Vulnerability"},"content":{"rendered":"<p>We&#8217;ve <a href=\"https:\/\/www.intego.com\/mac-security-blog\/more-complaints-over-apples-delayed-dns-patch\/\">written<\/a> <a href=\"https:\/\/www.intego.com\/mac-security-blog\/check-your-dns-server\/\">many<\/a> <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-has-yet-to-patch-dns-vulnerability\/\">times<\/a> about the recently found <a href=\"https:\/\/www.intego.com\/mac-security-blog\/serious-flaw-in-dns-system-found-and-patched\/\">DNS vulnerability<\/a>, but it&#8217;s clear that many people don&#8217;t understand the ins and outs of this kind of flaw. Unlike problems on a client computer, which are generally easy to explain (though, to be honest, &#8220;buffer overflow&#8221; isn&#8217;t plain English), this one&#8217;s much more complex. Glenn Fleishman and Rich Mogull, <a href=\"http:\/\/www.macworld.com\/article\/134823\/2008\/08\/dns.html\">writing at Macworld<\/a>, have a clear and thorough expos\u00e9 of the issue, its effects, and how it can be fixed. (Or how it has been, sort of, fixed.)  They point out that, even if Mac OS X clients have not been fixed, the risk is minimal.<\/p>\n<p>So, for now, if you are running a Mac OS X server, make sure you apple the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-important-security-update\/\">recent security update<\/a>. I&#8217;m sure that more info will be coming soon regarding this vulnerability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;ve written many times about the recently found DNS vulnerability, but it&#8217;s clear that many people don&#8217;t understand the ins and outs of this kind of flaw. Unlike problems on a client computer, which are generally easy to explain (though, to be honest, &#8220;buffer overflow&#8221; isn&#8217;t plain English), this one&#8217;s much more complex. Glenn Fleishman [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"We&#039;ve written many times about the recently found DNS vulnerability, but it&#039;s clear that many people don&#039;t understand the ins and outs of this kind of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Everything You Need to Know about the DNS Vulnerability - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"We&#039;ve written many times about the recently found DNS vulnerability, but it&#039;s clear that many people don&#039;t understand the ins and outs of this kind of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-08-05T09:21:47+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/\",\"name\":\"Everything You Need to Know about the DNS Vulnerability - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2008-08-05T09:21:47+00:00\",\"dateModified\":\"2008-08-05T09:21:47+00:00\",\"description\":\"We've written many times about the recently found DNS vulnerability, but it's clear that many people don't understand the ins and outs of this kind of\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Everything You Need to Know about the DNS Vulnerability\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Everything You Need to Know about the DNS Vulnerability\",\"datePublished\":\"2008-08-05T09:21:47+00:00\",\"dateModified\":\"2008-08-05T09:21:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/#webpage\"},\"wordCount\":145,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"We've written many times about the recently found DNS vulnerability, but it's clear that many people don't understand the ins and outs of this kind of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Everything You Need to Know about the DNS Vulnerability - The Mac Security Blog","og_description":"We've written many times about the recently found DNS vulnerability, but it's clear that many people don't understand the ins and outs of this kind of","og_url":"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/","og_site_name":"The Mac Security Blog","article_published_time":"2008-08-05T09:21:47+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/","name":"Everything You Need to Know about the DNS Vulnerability - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2008-08-05T09:21:47+00:00","dateModified":"2008-08-05T09:21:47+00:00","description":"We've written many times about the recently found DNS vulnerability, but it's clear that many people don't understand the ins and outs of this kind of","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Everything You Need to Know about the DNS Vulnerability"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Everything You Need to Know about the DNS Vulnerability","datePublished":"2008-08-05T09:21:47+00:00","dateModified":"2008-08-05T09:21:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/everything-you-need-to-know-about-the-dns-vulnerability\/#webpage"},"wordCount":145,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-40","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/248"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=248"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/248\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}