From Bugzilla Helper: User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.3) Gecko/20030314 Description of problem: nscd uses the result of GETHOSTBYADDR requests to answer later GETHOSTBYNAME requests. An attacker might poison the nscd cache and redirect IP traffic. See the attachments for a sample session and configuration files. Version-Release number of selected component (if applicable): nscd-2.2.5-43 How reproducible: Always Steps to Reproduce: 1. setup nameserver with a PTR RR resolving to "localhost." 2. connect to the victim host using the IP of the PTR RR 3. now the victim's nscd cache is poinsoned and traffic to the hostname localhost will we directed to the attacher's IP Additional info:
Created attachment 91562 [details] Example session 1
Created attachment 91563 [details] Example session 2
Created attachment 91564 [details] nscd configuration file
Created attachment 91565 [details] nsswitch.conf
Created attachment 91566 [details] /etc/hots
This shouldn't be a problem anymore in RHL9. Please try it.
Verified -- RHL9 (all updates installed) does not exhibit this problem.