nginx exploit / accept filters

2013-07-26 Thread Mark Felder
As described here: http://lists.grok.org.uk/pipermail/full-disclosure/2013-July/091084.html If I understand this correctly our accept filters will have zero effect on stopping this exploit, correct? ___ freebsd-security@freebsd.org mailing list

Re: nginx exploit / accept filters

2013-07-26 Thread John-Mark Gurney
Mark Felder wrote this message on Fri, Jul 26, 2013 at 06:40 -0500: As described here: http://lists.grok.org.uk/pipermail/full-disclosure/2013-July/091084.html If I understand this correctly our accept filters will have zero effect on stopping this exploit, correct? Depending upon where the

bind9 and CVE-2013-4854

2013-07-26 Thread Ollivier Robert
I have updated both dns/bind98 and dns/bind99 to fix CVE-2013-4854 as indicated in https://kb.isc.org/article/AA-01015/0 A specially crafted query that includes malformed rdata can cause named to terminate with an assertion failure while rejecting the malformed query. BIND 9.6 and BIND 9.6-ESV

Re: bind9 and CVE-2013-4854

2013-07-26 Thread Mark Boolootian
I have updated both dns/bind98 and dns/bind99 to fix CVE-2013-4854 as indicated in https://kb.isc.org/article/AA-01015/0 Thank you very much for that. Does this include the RRL/RPZ patches? mark ___ freebsd-security@freebsd.org mailing list

FreeBSD Security Advisory FreeBSD-SA-13:07.bind

2013-07-26 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 = FreeBSD-SA-13:07.bind Security Advisory The FreeBSD Project Topic: