|
Message-ID: <20090729134819.GA29121@openwall.com> Date: Wed, 29 Jul 2009 17:48:19 +0400 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Subject: Re: debian bug report on bind9 DoS On Wed, Jul 29, 2009 at 05:15:09PM +0400, Solar Designer wrote: > Confirmed on 9.3.5-P2 (removing the "$packet->sign_tsig(...)" line from > the exploit as above) with whatever patches we happened to have until > this latest fix. It gets worse: I was also able to crash named from an IP address explicitly denied in "allow-query". I did verify that non-malicious queries from that IP address were indeed correctly denied. It appears that BIND does too much processing too early in the code. Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.