[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [cobalt-security] Glibc Security Update 2.0.1



DB> Date: Fri, 25 Apr 2003 10:38:13 -0500
DB> From: David Black


DB> Thanks, Eddy. I'd obviously be in big trouble without help from

Very welcome.


DB> list members like you. My question was based on having read
DB> "maximum buffer size... when processing a DNS response" in
DB> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1146

Yes, that's an important one.  A large number of programs use the
resolver, asking it "hey, look this up for me".  If a remote DNS
server is evil, it sends a specially-crafted packet for the
resolver... which, being an overlay library, is running at the
same permission level as the binary it's helping.


Eddy
--
Brotsman & Dreger, Inc. - EverQuick Internet Division
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 (785) 865-5885 Lawrence and [inter]national
Phone: +1 (316) 794-8922 Wichita

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Mon, 21 May 2001 11:23:58 +0000 (GMT)
From: A Trap <blacklist@xxxxxxxxx>
To: blacklist@xxxxxxxxx
Subject: Please ignore this portion of my mail signature.

These last few lines are a trap for address-harvesting spambots.
Do NOT send mail to <blacklist@xxxxxxxxx>, or you are likely to
be blocked.