Mac OS X: Directory Access Configuration In the Presence of a Malicious DHCP Response
Please note that the exploit requires the malicious DHCP server to be located on your local subnet. For typical home network configurations with a broadband (DSL or cable service) modem and a NAT (Network Address Translation) device, such as Apple's Airport, this exploit is not possible.
If there is a chance that a malicious DHCP server has been injected into your subnet or you are operating on an untrusted network there are two solutions to the potential vulnerability depending on if you are using a directory service.
http://docs.info.apple.com/article.html?artnum=32478

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic