[dns-operations] CVE-2015-7547: glibc getaddrinfo buffer overflow
ray at isc.org
Tue Feb 23 19:43:19 UTC 2016
On 23/02/2016 19:27, Brian Hartvigsen (bhartvig) wrote:
> I actually wrote the blog post and tried to be very specific in what I
> wrote. The claim was that we could protect from the malformed DNS
> packets put forward in the PoC code. Which is accurate and the best
> information we had to go on at the time. Further updates have come out
> now that say the vulnerability is exploitable with properly constructed
> DNS packets. That’s a whole different ball game (as discussed in this
> thread and many others like it.)
We at ISC have been reluctant to say that running BIND will protect you,
because we simply can't be sure.
I personally think it's very unlikely that a full exploit could make it
through this path, although a crash exploit seems perfectly feasible.
The supposition that RRs will probably come out of cache in a different
order to how they went in is likely a factor in our favour.
More information about the dns-operations