TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Blizzard games were vulnerable to DNS rebinding attack

207 点作者 csmajorfive超过 7 年前

9 条评论

DrJokepu超过 7 年前
So basically this is a local web server that is used for IPC? Is there a reason to do local IPC over TCP/IP, rather than over named pipes / unix pipes, other than not knowing about the existence of named pipes / unix pipes?
评论 #16208100 未加载
评论 #16208405 未加载
评论 #16210968 未加载
评论 #16209342 未加载
评论 #16207998 未加载
评论 #16210709 未加载
评论 #16209036 未加载
zajd超过 7 年前
Disappointing (lack of) response&#x2F;fix<p>Would have assumed they&#x27;d do better given how polished their consumer products are
评论 #16207961 未加载
评论 #16208052 未加载
68c12c16超过 7 年前
the DNS rebinding vulnerability exists in applications other than Blizzard games, such as this one in Bittorrent Transmission also reported by Tavis Ormandy....<p><a href="https:&#x2F;&#x2F;github.com&#x2F;transmission&#x2F;transmission&#x2F;pull&#x2F;468" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;transmission&#x2F;transmission&#x2F;pull&#x2F;468</a><p>Seems to be a quite prevalent issue...
评论 #16207984 未加载
aplorbust超过 7 年前
A mischievous person renting a domainname can list <i>any</i> public or private IP addresses in her A records; and she can list any nameservers, including ones with which she has no relationship. She can list an IP address that the user may be utilising or renting.<p>I use a fast DNS resolution solution that only queries authoritative servers and stores IPs in constant, perfect hash databases, then in kdb+. No caches. I see the IP addresses that are returned in DNS packets not as ephemeral and inconseqential, but as entries in a database that need to be validated before insert.<p>If I see some nonsense like 127.0.0.1 in an A record, let alone a public IP address that Im using, it is rejected. I have seen NS records with 127.0.0.1 as well.<p>Are there DNS rebinding attacks that do not use iframes, Javascript or some other way to trigger automatic lookups <i>without user interaction</i>? In theory perhaps. But every attack I have seen relies on triggering lookups automatically.<p>Its too bad the popular browsers make automatic requests for resources, automatically follow redirects and do not allow users to disable this default behavior.<p>However users can make use of less complex HTTP clients that do not make such automatic requests and where redirects can be disabled. These can be used in tandem with the popular browsers to give users more transparency and control.<p>Also isnt it possible to use SSL&#x2F;TLS for localhost JSON-RPC? Theoretically couldnt users make use of client certificates?<p>Just a thought.
评论 #16210290 未加载
Jyaif超过 7 年前
Developer 101: if you want to do a blacklist, do a whitelist instead.
评论 #16208217 未加载
评论 #16208206 未加载
评论 #16208274 未加载
greglindahl超过 7 年前
The vulnerable update daemon is running all of the time if you&#x27;ve installed any Blizzard game in the past, not just if you currently play Blizzard games?
评论 #16208051 未加载
skela224超过 7 年前
Would having TLS on the localhost endpoint (without client certificates) make the attack more difficult? the browser would have to validate the localhost-returned cert against the attacker.com hostname.
dooglius超过 7 年前
&gt; Any website can simply create a dns name that they are authorized to communicate with, and then make it resolve to localhost.<p>So if I understand this correctly, websites can now bypass all firewalls and send traffic to any _local_ port at will? It also seems that this same trick would apply to local&#x2F;intranet IPs (e.g. have domains that redirect to 192.168.0.x) allowing interaction with things like printers. While Blizzard has a bug, it seems to be the browser that has the real vulnerability here.<p>Edit: The replies have good explanations with more detail why this would be difficult to fix -- the host doesn&#x27;t have enough context to differentiate between &quot;intended&quot; and &quot;unintended&quot; IPs without a bunch of pernicious edge cases.
评论 #16208122 未加载
评论 #16208226 未加载
评论 #16208282 未加载
评论 #16208283 未加载
btym超过 7 年前
I assume there&#x27;s a similar patch for the Mac client, but this offers no protection for users running the Windows client via WINE.