oss-sec mailing list archives
Re: Re: CVE Request New-djbdns: dnscache: potential cache poisoning
From: P J P <ppandit () redhat com>
Date: Thu, 20 Feb 2014 11:57:19 +0530 (IST)
+-- On Wed, 19 Feb 2014, cve-assign () mitre org wrote --+ | traditional sense. Yes, we realize that there's a potentially | important and potentially simple attack possibility that could have | been avoided by not choosing djb33. That's not sufficient, however. What do you mean not sufficient? | Also, in this case, some aspects of making a better choice (e.g., with | sufficiently fast and auditable pseudorandom hashing code) were | probably not even understood in the research community at the time the | software was originally written. I don't understand. How is it relevant that it was not well understood at the time when software was written? It is still an issue. And that argument could be true for many other issues. Like the JSON library example earlier in this thread, or -> http://www.cvedetails.com/cve/CVE-2012-0770 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4885 | CVE does, as a secondary form of inclusion, cover vulnerability | advisories from a vendor who was the original author of a piece of | software and publishes a change as a required security update. That is | unlikely here; nobody is anticipating djbdns-1.06. Woh..woh..woh!!! Please note that the CVE is requested for 'New-djbdns'. New-djbdns is a fully fledged, production quality, fast growing fork of the 'djbdns'. New-djbdns -> http://pjp.dgplug.org/ndjbdns/ I am the upstream developer and Fedora package maintainer of this project. I assure you, version 1.06 is brewing and brewing good. It'll be served when it is ready. I request you to kindly assign a CVE for this and the other issue in New-djbdns. Lot of users depend of it. Thank you. -- Prasad J Pandit / Red Hat Security Response Team
Current thread:
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning, (continued)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning P J P (Feb 11)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning Michael Samuel (Feb 11)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning P J P (Feb 11)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning P J P (Feb 17)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning Michael Samuel (Feb 17)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning P J P (Feb 18)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning Michael Samuel (Feb 11)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning P J P (Feb 11)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning Florian Weimer (Feb 27)
- Re: Re: CVE Request New-djbdns: dnscache: potential cache poisoning P J P (Feb 19)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning cve-assign (Feb 20)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning P J P (Feb 20)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning cve-assign (Feb 20)
- Re: Re: CVE Request New-djbdns: dnscache: potential cache poisoning Michael Samuel (Feb 20)