Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 26 Jun 2002 17:39:54 +0200
From:      Alain Thivillon <at@rominet.net>
To:        freebsd-security@freebsd.org
Subject:   Re: bsd libc dns resolving code vulnerable?
Message-ID:  <20020626153954.GL9492@roadrunner.rominet.net>
In-Reply-To: <20020626152832.GE65700@madman.nectar.cc>
References:  <20020626165034.Q35146-100000@gwdu60.gwdg.de> <20020626152832.GE65700@madman.nectar.cc>

next in thread | previous in thread | raw e-mail | index | archive | help
> > http://www.pine.nl/advisories/pine-cert-20020601.txt
> > 
> > Any comments?
> 
> Fixed in -CURRENT, RELENG_4, and RELENG_4_6 early this morning.  I
> believe Warner is fixing RELENG_4_5 at the moment.  When that is done,
> an advisory will be published.
> 
> In short: upgrade.  Be sure to recompile any statically linked
> applications that use DNS.

Do you know if using a local caching name server will prevent
exploitation ? In short, does for example bind filters the responses
leading to an overflow ? In this case, i will classify this to
non-critical bug, because if someone has root access to your nameserver,
you are in trouble, even without overflow in libc.



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020626153954.GL9492>