Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 27 Jun 2002 09:51:15 +1000
From:      Mark.Andrews@isc.org
To:        Alain Thivillon <at@rominet.net>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: bsd libc dns resolving code vulnerable? 
Message-ID:  <200206262351.g5QNpFm0029015@drugs.dv.isc.org>
In-Reply-To: Your message of "Wed, 26 Jun 2002 17:39:54 %2B0200." <20020626153954.GL9492@roadrunner.rominet.net> 

next in thread | previous in thread | raw e-mail | index | archive | help

> > > http://www.pine.nl/advisories/pine-cert-20020601.txt
> > > 
> > > Any comments?
> > 
> > Fixed in -CURRENT, RELENG_4, and RELENG_4_6 early this morning.  I
> > believe Warner is fixing RELENG_4_5 at the moment.  When that is done,
> > an advisory will be published.
> > 
> > In short: upgrade.  Be sure to recompile any statically linked
> > applications that use DNS.
> 
> Do you know if using a local caching name server will prevent
> exploitation ? In short, does for example bind filters the responses
> leading to an overflow ? In this case, i will classify this to
> non-critical bug, because if someone has root access to your nameserver,
> you are in trouble, even without overflow in libc.

	As long as your nameserver constructs the response and doesn't
	forward it you are fine.  BIND 9 alway constucts the response
	(UPDATE forwarding aside).  BIND 8 sometimes constructs the
	response and sometimes forwards it.

	Mark
> 
> 
> 
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
--
Mark Andrews, Internet Software Consortium
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: Mark.Andrews@isc.org

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200206262351.g5QNpFm0029015>