Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 9 Dec 2014 08:16:20 +0100
From: Peter van Dijk <peter.van.dijk@...herlabs.nl>
To: oss-security@...ts.openwall.com
Subject: Re: PowerDNS Security Advisory 2014-02

Hello Hanno,

On 08 Dec 2014, at 23:26 , Hanno Böck <hanno@...eck.de> wrote:

> Thanks for the info.
> 
> Right now details on this vuln seem to be scarce. I asked myself some
> questions, but I don't know DNS internals very well.

These two articles from NLNetlabs and ISC might help, they are more verbose than ours:
http://www.unbound.net/downloads/CVE-2014-8602.txt
https://kb.isc.org/article/AA-01216

I’m happy to answer followup questions.

> As this affects three implementations the obvious first question would
> be if others are affected, too. Has this been checked?

Somebody asked me to (help him) check djbdns today, which we’ll do. Any other implementations you are interested in? I have a lab setup for this issue so I’m happy to check.

> And is this only a DoS for the attacked server or would it also allow
> some completely new kind of DNS reflection attack (i.e. generating a
> loop where every loop iteration generates an UDP packet send to a
> victim)?

I’m convinced the loop could involve unwilling victims (unless they send responses that break the loop!), but I have not tried this in practice.

Kind regards,
-- 
Peter van Dijk
Netherlabs Computer Consulting BV - http://www.netherlabs.nl/


Download attachment "signature.asc" of type "application/pgp-signature" (842 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.