The only effort that goes in to the attempt is writing the software. Once that is done, you just drain bank accounts or install zombie software until the cows come home. It doesn't matter that attacking computers one at a time seems to be more effort than attacking a DNS server. It's just like spam. Zero cost.
Except the network resources involved in attacking a client computer isn't worth it when you can attack the DNS server. The payout just isn't there.
I still disagree. I am not describing an attack that comes randomly; I am describing an attack that comes at you once your browser can be directed to an evil site. Once that happens, the site can include IMG links to all the domains they want to poison; hence, they know you are going to be looking those domains up in only a few milliseconds. This increases their chances of success tremendously. They will even know when they succeeded, because your computer will be contacting their evil site to try to load those IMGs.
Yup, they certainly can. And if they have 500 sites listed there, and you haven't been to them, they can spam the crap out of your computer with a SMALL chance of success that the exploit will be successful. Now what does that mean? Pretty much nothing, because you would still need to go to one of the X sites they had listed before any type of exploit would be successful.
So, for your situation to work properly, I would need to go to an evil site, have them gather my IP, load hundreds of images on random sites that you wish to exploit, have the exploit be successful, and then GO to the one, hell lets say you were REALLY successful and guessed right twice, then go to one of the TWO out of 500 sites, all before I restart.
So... let me ask you this... why? I'm already on your "evil site" any exploit you could then trigger on the spoofed site could have been done on the evil site. Your idea wouldn't work in a situation like this message board, linking one img to your site, the rest to others. Because by the time you got the request form my DNS server, I would already be resolving the other sites, causing your exploit to be late.
If I know you are vulnerable (User-Agent: OS X), and I can make you look up domains (image links on my evil site), then I can flood you with poison DNS replies and have a high degree of success.
Until Apple patches.
You would not have a high degree of success. You're success rate would still be extremely extremely small, the only advantage you would have is the knowledge that I would be doing some form of DNS request. The odds of the exploit being successful are still the same.
Not to mention, if the DNS server you are using is already patched, then the client machine is also safe, since the fix (better randomization) would already be in place.
Now, I again want to point out i'm not saying this isn't an issue... it is an issue that needs to be addressed soon. It's nowhere close to being as serious as you believe for clients. You might want to check out the actual vulnerbility (
http://www.kb.cert.org/vuls/id/800113 ) to get some more information on what it does, and more information as to why DNS servers are the ones targeted here, not clients.