Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 29 Jun 2002 14:48:56 +1200 (NZST)
From:      Andrew McNaughton <andrew@scoop.co.nz>
To:        Brett Glass <brett@lariat.org>
Cc:        security@FreeBSD.ORG
Subject:   Re: libc flaw: BIND 9 closes most holes but also opens one
Message-ID:  <20020629143708.R92518-100000@a2>
In-Reply-To: <200206282259.QAA03790@lariat.org>

next in thread | previous in thread | raw e-mail | index | archive | help


On Fri, 28 Jun 2002, Brett Glass wrote:

> I've installed BIND 9 on our main domain name server to shield systems
> (including Windows boxes, which may be vulnerable) from the libc hole.
> Unfortunately, according to ISC, BIND 9 comes with a version of
> libbind that's vulnerable. (See http://www.cert.org/advisories/CA-2002-19.html.)
> So, if you load up BIND 9 and an app that uses it (such as Sendmail) links
> to the vulnerable libbind, you're still exposed.

You do have an advantage though in tha bind can run with reduced
privileges and in a chroot dir.  Much the same sort of protection that
privilege separation in sshd affords.

Given that unsafe privileged code is talking to bind, a compromised bind
could perhaps be made to do evil things, but producing an exploit which
modifies the executing code to that extent is no easy target.

Andrew McNaughton


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020629143708.R92518-100000>