new DNS forwarder vulnerability

Merike Kaeo merike at
Fri Mar 14 16:05:00 UTC 2014

On Mar 14, 2014, at 7:06 AM, Stephane Bortzmeyer <bortzmeyer at> wrote:

> On Fri, Mar 14, 2014 at 01:59:27PM +0000,
> Nick Hilliard <nick at> wrote 
> a message of 10 lines which said:
>> did you characterise what dns servers / embedded kit were
>> vulnerable?
> He said "We have not been able to nail this vulnerability down to a
> single box or manufacturer" so it seems the answer is No.

It is my understanding  that many CPEs work off of same reference implementation(s).  I haven't
had any cycles for this but with all the CPE issues out there it would be interesting to have
a matrix of which CPEs utilize which reference implementation.  That may start giving some clues.

Has someone / is someone doing this?

- merike

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 495 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <>

More information about the NANOG mailing list