02-17-2016 08:53 AM
Hard to say.
But this is a Linux bug. Not sure how that affects the router.
02-17-2016 09:09 AM
Most home routers are based on the Linux kernel (certainly the Actiontecs are) and usually use a lot of the GNU infrastructure, too. The real question is are they using glibc or something else like uclibc.
02-17-2016 09:26 AM
It may be possible to filter using iptable rules according to the announcement:
Mitigating factors for UDP include:
- A firewall that drops UDP DNS packets > 512 bytes.
Mitigating factors for TCP include:
- Limit all replies to 1024 bytes.
This should catch any serious stack overflowing cracking attempts. If would good for Verizon to tell their customers how to implement such rules. Of course, they could add such rules to their customer-facing routers as an alternative, I expect, but they should tell us if they are.
02-17-2016 01:07 PM
The problem with those suggested mitigations is that they're essentially requiring the user to avoid any DNS resolvers that provide responses using the Extension Mechanisms for DNS, which translates to pretty much any of those that are useful for zones protected with DNSsec signatures.
It may be moot for many FiOS users, as it appears that VZ's name servers don't properly handle large replies right now anyway. You can see for yourself if you check them with OARC's DNS Reply Size Test Server.
So basically the user's choice is to either use resolvers that allow zones to be spoofed or to use resolvers that might send an answer that overflows a buffer.