Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 26 Jun 2002 11:07:06 -0500
From:      "Jacques A. Vidrine" <nectar@freebsd.org>
To:        Alain Thivillon <at@rominet.net>
Cc:        freebsd-security@freebsd.org
Subject:   Re: bsd libc dns resolving code vulnerable?
Message-ID:  <20020626160706.GC72438@madman.nectar.cc>
In-Reply-To: <20020626153954.GL9492@roadrunner.rominet.net>
References:  <20020626165034.Q35146-100000@gwdu60.gwdg.de> <20020626152832.GE65700@madman.nectar.cc> <20020626153954.GL9492@roadrunner.rominet.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Jun 26, 2002 at 05:39:54PM +0200, Alain Thivillon wrote:

To be clear, we're not certain that it /is/ exploitable.  However,
the only safe thing to do is assume that it is.

> Do you know if using a local caching name server will prevent
> exploitation ? 

I'm afraid I don't know.  It depends upon whether the name server
rejects or cleans responses.  And it would have to be local, as
in localhost.

Cheers,
-- 
Jacques A. Vidrine <n@nectar.cc>                 http://www.nectar.cc/
NTT/Verio SME          .     FreeBSD UNIX     .       Heimdal Kerberos
jvidrine@verio.net     .  nectar@FreeBSD.org  .          nectar@kth.se

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020626160706.GC72438>