[26012] in bugtraq
Re: Remote buffer overflow in resolver code of libc
daemon@ATHENA.MIT.EDU (David Conrad)
Sat Jun 29 00:47:04 2002
Date: Thu, 27 Jun 2002 08:24:36 -0700
From: David Conrad <david.conrad@nominum.com>
To: Brett Glass <brett@lariat.org>, Mark Lastdrager <mark@pine.nl>,
<bugtraq@securityfocus.com>
Cc: <vulnwatch@vulnwatch.org>,
Vulnerabilty Development <vuln-dev@securityfocus.com>,
<editors@daemonnews.org>
Message-ID: <B9407C44.D869%david.conrad@nominum.com>
In-Reply-To: <4.3.2.7.2.20020626174448.00e8b3a0@localhost>
Mime-version: 1.0
Content-type: text/plain; charset="US-ASCII"
Content-transfer-encoding: 7bit
Hi,
On 6/26/02 4:50 PM, "Brett Glass" <brett@lariat.org> wrote:
> On individual machines, one could direct all queries to localhost and set
> up one's favorite name daemon (e.g. BIND or djbdns) to "sanitize"
> incoming responses.
My understanding is that this will work with BINDv9 since the cache
synthesizes all responses returned to the requestor and a bad response
wouldn't be synthesized. BINDv8 and BINDv4 will sometimes (in an attempt to
be faster) simply pass the authoritative response on to the requestor (which
is the bad thing). Don't have a clue about what dnscache or MS DNS would
do.
Rgds,
-drc