Wietse:

Thank you very much for the response. I will look at the remaining two
items to see if they are also false positives based on the information you
provided for the other items. If I can't, I will try to get the lines
numbers at least for those two.

Thanks
Mc.

On Wed, Nov 16, 2016 at 7:54 PM, Wietse Venema <wie...@porcupine.org> wrote:

> McSec:
> > A Veracode scan reported the following vulnerabilites in postfix 3.0.1:
> >
> > vulnerability        module    source
> > Buffer Over Flow        dnsblog       home/.../src/dns/dns_rr.c
> > Buffer Over Flow        smtpd         home/.../src/tls/tls_scache.c
>
> There is no line number information, therefore this information is
> not actionable.
>
> > Numeric Errors          dnsblog       home/.../src/dns/dns_rr.c 262
> > Numeric Errors          dnsblog       home/.../src/dns/dns_rr.c 302
>
> Both are not a vulnerability, because DNS replies don't contain 268
> million responses. The DNS reply count is a 16-bit number, and is
> therefore limited to 0..65535.
>
> > Numeric Errors          dnsblog       home/.../src/dns/dns_strtype.c 207
>
> Not a vulnerability, because the dns_type_map[] table with symbolic
> names for DNS record types is much smaller than 2 billion.  The DNS
> record type is a 16-bit number, therefore there can be only 65536
> different record types.
>
> > Numeric Errors          smtpd         home/.../src/tls/tls_dane.c 1291
>
> Not a vulnerability, because the trust anchor file is owned by a
> trusted local user (root), and because that file will contain fewer
> than 2 billion entries.
>
>         Wietse
>

Reply via email to