Date: Wed, 26 Jun 2002 11:07:06 -0500 From: "Jacques A. Vidrine" <nectar@freebsd.org> To: Alain Thivillon <at@rominet.net> Cc: freebsd-security@freebsd.org Subject: Re: bsd libc dns resolving code vulnerable? Message-ID: <20020626160706.GC72438@madman.nectar.cc> In-Reply-To: <20020626153954.GL9492@roadrunner.rominet.net> References: <20020626165034.Q35146-100000@gwdu60.gwdg.de> <20020626152832.GE65700@madman.nectar.cc> <20020626153954.GL9492@roadrunner.rominet.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Jun 26, 2002 at 05:39:54PM +0200, Alain Thivillon wrote: To be clear, we're not certain that it /is/ exploitable. However, the only safe thing to do is assume that it is. > Do you know if using a local caching name server will prevent > exploitation ? I'm afraid I don't know. It depends upon whether the name server rejects or cleans responses. And it would have to be local, as in localhost. Cheers, -- Jacques A. Vidrine <n@nectar.cc> http://www.nectar.cc/ NTT/Verio SME . FreeBSD UNIX . Heimdal Kerberos jvidrine@verio.net . nectar@FreeBSD.org . nectar@kth.se To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020626160706.GC72438>