Date: Sat, 29 Jun 2002 14:48:56 +1200 (NZST) From: Andrew McNaughton <andrew@scoop.co.nz> To: Brett Glass <brett@lariat.org> Cc: security@FreeBSD.ORG Subject: Re: libc flaw: BIND 9 closes most holes but also opens one Message-ID: <20020629143708.R92518-100000@a2> In-Reply-To: <200206282259.QAA03790@lariat.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 28 Jun 2002, Brett Glass wrote: > I've installed BIND 9 on our main domain name server to shield systems > (including Windows boxes, which may be vulnerable) from the libc hole. > Unfortunately, according to ISC, BIND 9 comes with a version of > libbind that's vulnerable. (See http://www.cert.org/advisories/CA-2002-19.html.) > So, if you load up BIND 9 and an app that uses it (such as Sendmail) links > to the vulnerable libbind, you're still exposed. You do have an advantage though in tha bind can run with reduced privileges and in a chroot dir. Much the same sort of protection that privilege separation in sshd affords. Given that unsafe privileged code is talking to bind, a compromised bind could perhaps be made to do evil things, but producing an exploit which modifies the executing code to that extent is no easy target. Andrew McNaughton To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020629143708.R92518-100000>