Hello everyone,

a while ago I asked for guidance concerning a vulnerability I found in a DNS 
library.
Unfortunately I cannot find the message right now, so please excuse the new 
thread.

The vulnerability now has a CVE and a GitHub Advisory published here:
https://github.com/dnsjava/dnsjava/security/advisories/GHSA-cfxw-4h78-h7fw

I suspect this might be useful feedback to some of you designing DNSSEC 
validation routines, especially for validating stub resolvers. I have done 
little research into which other DNS libraries might be affected, but bind and 
unbound seem fine.

Best,
Thomas

PS: The algorithm in the advisory was copied from somewhere else, so please 
mentally replace "PTR" with any "QTYPE".

-- 

```
M.Sc. Thomas Bellebaum
Applied Privacy Technologies
Fraunhofer Institute for Applied and Integrated Security AISEC

Lichtenbergstraße 11, 85748 Garching near Munich (Germany)
Tel. +49 89 32299 86 1039
thomas.belleb...@aisec.fraunhofer.de
https://www.aisec.fraunhofer.de

```
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to