Re: [Tails-dev] Is Tails affected by the CVE-2015-7547 glibc getaddrinfo() vulnerability?

2016-02-18 Thread Jurre van Bergen
Hi, This is an on-going investigation. Indeed, applications using the Tor socks port for name resolution are not vulnerable for this attack. An automated test was ran trying to determine (using the public proof of concept) whether any application was vulnerable, so far, we're on the safe side

Re: [Tails-dev] Is Tails affected by the CVE-2015-7547 glibc getaddrinfo() vulnerability?

2016-02-18 Thread intrigeri
Hi, my understanding is that clients that use Tor SOCKS port for name resolution are fine. For clients who use the DNSPort, it's not clear to me if an attacker-controlled payload can make it's way from the exit node being used for the name resolution to the client. Has anyone looked into this?

[Tails-dev] Is Tails affected by the CVE-2015-7547 glibc getaddrinfo() vulnerability?

2016-02-17 Thread co
https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html especially curl from htpdate, torbrowser, etc. If affected, exits could easily do MITM on DNS lookups.