Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 8 Dec 2014 23:26:16 +0100
From: Hanno Böck <hanno@...eck.de>
To: Peter van Dijk <peter.van.dijk@...herlabs.nl>
Cc: oss-security@...ts.openwall.com
Subject: Re: PowerDNS Security Advisory 2014-02

Thanks for the info.

Right now details on this vuln seem to be scarce. I asked myself some
questions, but I don't know DNS internals very well.

As this affects three implementations the obvious first question would
be if others are affected, too. Has this been checked?

And is this only a DoS for the attacked server or would it also allow
some completely new kind of DNS reflection attack (i.e. generating a
loop where every loop iteration generates an UDP packet send to a
victim)?


-- 
Hanno Böck
http://hboeck.de/

mail/jabber: hanno@...eck.de
GPG: BBB51E42

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.