Date: Thu, 27 Jun 2002 09:51:15 +1000 From: Mark.Andrews@isc.org To: Alain Thivillon <at@rominet.net> Cc: freebsd-security@FreeBSD.ORG Subject: Re: bsd libc dns resolving code vulnerable? Message-ID: <200206262351.g5QNpFm0029015@drugs.dv.isc.org> In-Reply-To: Your message of "Wed, 26 Jun 2002 17:39:54 %2B0200." <20020626153954.GL9492@roadrunner.rominet.net>
next in thread | previous in thread | raw e-mail | index | archive | help
> > > http://www.pine.nl/advisories/pine-cert-20020601.txt > > > > > > Any comments? > > > > Fixed in -CURRENT, RELENG_4, and RELENG_4_6 early this morning. I > > believe Warner is fixing RELENG_4_5 at the moment. When that is done, > > an advisory will be published. > > > > In short: upgrade. Be sure to recompile any statically linked > > applications that use DNS. > > Do you know if using a local caching name server will prevent > exploitation ? In short, does for example bind filters the responses > leading to an overflow ? In this case, i will classify this to > non-critical bug, because if someone has root access to your nameserver, > you are in trouble, even without overflow in libc. As long as your nameserver constructs the response and doesn't forward it you are fine. BIND 9 alway constucts the response (UPDATE forwarding aside). BIND 8 sometimes constructs the response and sometimes forwards it. Mark > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message -- Mark Andrews, Internet Software Consortium 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: Mark.Andrews@isc.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200206262351.g5QNpFm0029015>