Controversay has reigned around the major Internet vulnerability reported last week, but now respected ISP Internet Solutions (IS) has confirmed the vulnerability and the worldwide release of a patch to secure it.
A statement for IS reveals that a prominent DNS researcher recently uncovered a new method of using DNS Query-ID spoofing to poison DNS caches.
The vulnerability would have allowed hackers to take control of where a user's browser ended up, regardless of what he had typed into the address field.
"Cache poisoning allows an attacker to selectively control destination Web sites for users accessing a compromised DNS," says the IS statement.
"For example, if a cache entry for Google is poisoned, a user typing in www.google.com would not get the genuine Google website but rather a site controlled by the attacker. This is a serious problem because users believe they are going to a legitimate site and thus have no reason to suspect they are under attack.
"Under such circumstances a user may be perfectly comfortable taking a survey that requests confidential personal information, again since they believe they are at a site they are familiar with and visit often."
A number of vendors working in secret to correct the problem and patches were issued last Tuesday evening.
IS assures its users that all its servers were updated and secure by midday last Wednesday.