|
Message-ID: <alpine.LFD.2.10.1402191227060.30795@wniryva.cad.erqung.pbz> Date: Wed, 19 Feb 2014 12:29:04 +0530 (IST) From: P J P <ppandit@...hat.com> To: oss security list <oss-security@...ts.openwall.com> Subject: Re: CVE Request New-djbdns: dnscache: potential cache poisoning Hello, +-- On Mon, 17 Feb 2014, Michael Samuel wrote --+ | I think I've come around to a yes for this one. Pushing attacker-chosen | entries out of the cache after only 100 packets is clearly not what the | admin wants. It makes a secondary attack (DNS over UDP blind cache | poisoning) much more viable than it was. | | I can think of some DoS scenarios where this vector would assist another | attack. Could we have a CVE for this please? Thank you. -- Prasad J Pandit / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.