|
Message-ID: <487405A6.5030406@freethemallocs.com> Date: Tue, 08 Jul 2008 16:26:14 -0800 From: Jonathan Smith <smithj@...ethemallocs.com> To: oss-security@...ts.openwall.com Subject: Re: Major DNS vulnerability announced [CVE Question] -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Steven M. Christey wrote: > By the way, I'm treating Microsoft's "DNS Cache Poisoning Vulnerability" > (CVE-2008-1454) as something that's Microsoft-specific, pending any > further public details. The bulletin doesn't seem to say anything about > it being a general design problem. BIND's advisory sounds suspiciously similar (indeed, until you sent this email, I didn't even consider that they were different). http://ftp.isc.org/isc/bind9/9.5.1b1/9.5.1b1 says "The method used makes it harder to spoof answers to a resolver by expanding the range of UDP ports from which queries are sent by the nameserver, thereby increasing the variability of parameters in outgoing queries." My reading of the above is that since a caching nameserver would obviously cache responses received, spoofing an answer to a query is a cache poisoning attack. Note how similar this is to http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx. "The security update addresses the vulnerabilities by... using random sockets for UDP queries..." But, really, I don't care. This mailing list is for FOSS software, and I doubt Microsoft's DNS server qualifies ;-) smithj -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (GNU/Linux) iEYEAREIAAYFAkh0BaYACgkQCG91qXPaRel2owCePCG6ladJ+Jp3uHEgqQebEe79 2pcAnizEmlO1LSAsGCiKmWoHhQBswVfC =3wnE -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.