Re: CVE-2008-1447 v. glibc

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Jeffrey Ollie <jeff <at> ocjtech.us> writes:

> I think that the problem is mostly a server problem

According to this:

http://www.kb.cert.org/vuls/id/800113

It is not just a server problem:

"These caching resolvers are the most common target for attackers; however, stub
resolvers are also at risk."

[...]

"As mentioned above, stub resolvers are also vulnerable to these attacks. Stub
resolvers that will issue queries in response to attacker behavior, and may
receive packets from an attacker, should be patched. System administrators
should be alert for patches to client operating systems that implement port
randomization in the stub resolver."

AFAIK, glibc is stub resolver on Fedora, hence the question.

--
Bojan




-- 
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux