On 03/10/2023 16:48, Johnnie W Adams via Exim-users wrote:
      What I take from this mitigation statement--Use a trustworthy DNS
resolver which is able to validate the data according to the DNS record
types--is that if our DNS service is solid, we are not vulnerable. Is this
accurate, or am I oversimplifying things?

It's in that vein, but not quite.  The issue pointed to by ZDI was the trusting
of the "chunk sizes" for the possibly multiple chunks of an RR, versus the whole
RR size.

An opinion from another (non-Exim, but a name I recognize) dev was
- yes there's at least one resolver out there that doesn't check these
- this would pass straight though glibc (ie, my inference: libc does not check 
this)

The mitigation statement from ZDI
was much more ominous, but I'm still parsing "network-adjacent attackers".

I wasn't sure about that, either.
--
Cheers,
  Jeremy


--
## subscription configuration (requires account):
##   https://lists.exim.org/mailman3/postorius/lists/exim-users.lists.exim.org/
## unsubscribe (doesn't require an account):
##   exim-users-unsubscr...@lists.exim.org
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to