Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.LFD.2.10.1402191227060.30795@wniryva.cad.erqung.pbz>
Date: Wed, 19 Feb 2014 12:29:04 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: oss security list <oss-security@...ts.openwall.com>
Subject: Re: CVE Request New-djbdns: dnscache: potential cache
 poisoning

   Hello,

+-- On Mon, 17 Feb 2014, Michael Samuel wrote --+
| I think I've come around to a yes for this one. Pushing attacker-chosen 
| entries out of the cache after only 100 packets is clearly not what the 
| admin wants.  It makes a secondary attack (DNS over UDP blind cache 
| poisoning) much more viable than it was.
|
| I can think of some DoS scenarios where this vector would assist another
| attack.

  Could we have a CVE for this please?

Thank you.
--
Prasad J Pandit / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.