oss-sec mailing list archives
CVE request New-djbdns: dnscache: possible DoS
From: P J P <ppandit () redhat com>
Date: Mon, 17 Feb 2014 14:12:26 +0530 (IST)
Hello,dnscache(8) resolver reads messages over a TCP connection one byte at a time. For long messages, it'll trigger as many read(2) calls as the length of a message. Thus consuming extra CPU cycles. A malicious remote user could use this to cause a DoS.
Upstream fix: ------------- -> https://github.com/pjps/ndjbdns/commit/a67293ce12832b55ec4271536282290ed17863f6 Reference: ---------- -> http://download.pureftpd.org/misc/dnscache-dos.c Thank you. -- Prasad J Pandit / Red Hat Security Response Team
Current thread:
- CVE request New-djbdns: dnscache: possible DoS P J P (Feb 17)
- Re: CVE request New-djbdns: dnscache: possible DoS P J P (Feb 18)
- Re: CVE request New-djbdns: dnscache: possible DoS cve-assign (Feb 19)
- Re: CVE request New-djbdns: dnscache: possible DoS P J P (Feb 19)
- Re: CVE request New-djbdns: dnscache: possible DoS cve-assign (Feb 20)
- Re: Re: CVE request New-djbdns: dnscache: possible DoS P J P (Feb 20)
- Re: CVE request New-djbdns: dnscache: possible DoS P J P (Feb 19)