diff options
author | remko <remko@FreeBSD.org> | 2008-07-14 04:47:44 +0800 |
---|---|---|
committer | remko <remko@FreeBSD.org> | 2008-07-14 04:47:44 +0800 |
commit | 460eb2f3b89f188cce86ed34c2ba8858178cc4c3 (patch) | |
tree | 271a670c5c4fbefd418c8f0dfe8000f6ca721e1f /security | |
parent | 60d1df0e81d9a4eda6b4671d986fb6c55ffbc25a (diff) | |
download | freebsd-ports-gnome-460eb2f3b89f188cce86ed34c2ba8858178cc4c3.tar.gz freebsd-ports-gnome-460eb2f3b89f188cce86ed34c2ba8858178cc4c3.tar.zst freebsd-ports-gnome-460eb2f3b89f188cce86ed34c2ba8858178cc4c3.zip |
Add the latest security advisory to vuxml.
Hat: secteam
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 47 |
1 files changed, 47 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 95e74832437e..975d0ac4e799 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,53 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="655ee1ec-511b-11dd-80ba-000bcdf0a03b"> + <topic>FreeBSD -- DNS cache poisoning</topic> + <affects> + <system> + <name>FreeBSD</name> + <range><gt>6.3</gt><lt>6.3_3</lt></range> + <range><gt>7.0</gt><lt>7.0_3</lt></range> + </system> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>The BIND DNS implementation does not randomize the UDP source + port when doing remote queries, and the query id alone does + not provide adequate randomization.</p> + <h1>Impact:</h1> + <p>The lack of source port randomization reduces the amount of + data the attacker needs to guess in order to successfully + execute a DNS cache poisoning attack. This allows the + attacker to influence or control the results of DNS queries + being returned to users from target systems.</p> + <h1>Workaround:</h1> + <p>Limiting the group of machines that can do recursive queries + on the DNS server will make it more difficult, but not + impossible, for this vulnerability to be exploited.</p> + <p>To limit the machines able to perform recursive queries, add an ACL in + named.conf and limit recursion like the following:</p> + <pre>acl example-acl {</pre> + <pre> 192.0.2.0/24;</pre> + <pre>};</pre> + <pre>options {</pre> + <pre> recursion yes;</pre> + <pre> allow-recursion { example-acl; };</pre> + <pre>};</pre> + </body> + </description> + <references> + <certvu>800113</certvu> + <cvename>CVE-2008-1447</cvename> + <freebsdsa>SA-08:06.bind</freebsdsa> + </references> + <dates> + <discovery>2008-07-08</discovery> + <entry>2008-07-13</entry> + </dates> + </vuln> + <vuln vid="bc20510f-4dd4-11dd-93e7-0211d880e350"> <topic>poppler -- uninitialized pointer</topic> <affects> |