RE: FW: CERT Advisory CA-2002-12 Format String Vulnerability in I SC D HCPD


Subject: RE: FW: CERT Advisory CA-2002-12 Format String Vulnerability in I SC D HCPD
From: stephen king (sking@chartercollege.edu)
Date: Wed May 08 2002 - 13:12:24 AKDT


What I can't figure out is why somebody would let ports 67 and 68 in or out
of their firewall in the first place. Granted, if one box is compromised
then your DHCP can get attacked by proxy, but I think at that point you've
got worse things to worry about than NSUPDATE messages.

-----Original Message-----
From: Arthur Corliss
To: Leif Sawyer; 'aklug@aklug.org'
Sent: 5/7/2002 7:02 PM
Subject: Re: FW: CERT Advisory CA-2002-12 Format String Vulnerability in ISC
D HCPD

> Because so many of us use DHCPd ...

I use DHCP, but DDNS is downright evil, as far as I'm concerned, so I'm
very
happy to note that disabling nsupdate leaves me unaffected. :-)

--

--Arthur Corliss Bolverk's Lair -- http://arthur.corlissfamily.org/ Digital Mages -- http://www.digitalmages.com/ "Live Free or Die, the Only Way to Live" -- NH State Motto

--------- To unsubscribe, send email to <aklug-request@aklug.org> with 'unsubscribe' in the message body.

--------- To unsubscribe, send email to <aklug-request@aklug.org> with 'unsubscribe' in the message body.



This archive was generated by hypermail 2a23 : Wed May 08 2002 - 13:11:41 AKDT