Hi,

Thank you for bringing it to the notice here on the mailing list. We have been 
working on a possible patch for the same, the beta version of the patch is 
available here on the mailing list.

Wrt the specific router you have mentioned, I dont know the details, maybe 
someone else with knowledge of that particular router and its firmware(s) will 
provide you the answer.

What I can say in general at a high level is that just because a networking 
related application in a embedded device or on the router is compiled against 
uclibc, doesnt make it automatically vulnerable. If there is a local dns 
caching/resolver daemon setup, then the dns query generated by the 
application/uclibc will go to this local logic. It inturn will decide whether 
to serve the info it already caches and or make a new request. In turn how this 
local dns caching/resolver daemon handles the dns query for further processing 
is what will decide, whether there is a risk with dns poison or not.

However devices which are deployed in the field and inturn having applications 
compiled against current version of uclibc directly communicating on the 
internet for dns lookup/resolution using uclibc's logic, would be vulnerable.

Once uclibc is updated, the applications / firmware of the devices would need 
to be updated by the device vendors and or open firmware teams.

Also do note that the patch/update that will be released is not a fool proof 
solution to the underlying problem. It makes the problem more difficult from a 
attackers perspective, but not necessarily impossible in all cases. And this 
particular aspect is independent of uclibc. The use of a secure dns variant is 
the more long term solution.

NOTE: My normal work is bit different from this specific domain. So do forgive 
my more generic thoughts, as I havent looked into the specific implementations 
out there currently wrt this chain.
_______________________________________________
devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to