AOH :: HP Unsorted D :: BX3684.HTM

DNS vulnerability impact on the libc stub resolver

DNS vulnerability impact on the libc stub resolver
DNS vulnerability impact on the libc stub resolver

Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1605-1 Florian Weimer 
July 08, 2008 
- ------------------------------------------------------------------------

Package        : glibc
Vulnerability  : DNS cache poisoning
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2008-1447
CERT advisory  : VU#800113

Dan Kaminsky discovered that properties inherent to the DNS protocol
lead to practical DNS spoofing and cache poisoning attacks.  Among
other things, successful attacks can lead to misdirected web traffic
and email rerouting.

At this time, it is not possible to implement the recommended
countermeasures in the GNU libc stub resolver.  The following
workarounds are available:

1. Install a local BIND 9 resoler on the host, possibly in
forward-only mode.  BIND 9 will then use source port randomization
when sending queries over the network.  (Other caching resolvers can
be used instead.)

2. Rely on IP address spoofing protection if available.  Successful
attacks must spoof the address of one of the resolvers, which may not
be possible if the network is guarded properly against IP spoofing
attacks (both from internal and external sources).

This DSA will be updated when patches for hardening the stub resolver
are available.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main 
For dpkg-ftp: dists/stable/updates/main 
Mailing list: 
Package info: `apt-cache show ' and 
Version: GnuPG v1.4.6 (GNU/Linux)


The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an email address, please forward it with full headers to