Full Disclosure mailing list archives
Re: DNS Pointer - DoS Exploit
From: "Cal Leeming [Simplicity Media Ltd]" <cal.leeming () simplicitymedialtd co uk>
Date: Fri, 03 Dec 2010 16:45:29 +0000
Curious.. Any POC code yet? On 03/12/2010 16:36, Srinivas Naik wrote:
Any Exploit available for below description DNS: Pointer LoopThis protocol anomaly is a DNS message with a set of DNS pointers that form a loop. This may indicate a denial-of-service (DoS) attempt. This entry may also trigger on non-DNS traffic transiting port 53, such as Peer to Peer, Chat, Trojan Horse Backdoors or other illicit traffic.Extended DescriptionA DNS packet with a pointer loop is a protocol anomaly which some programs may not handle gracefully.Cheers Naik _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- DNS Pointer - DoS Exploit Srinivas Naik (Dec 03)
- Re: DNS Pointer - DoS Exploit Cal Leeming [Simplicity Media Ltd] (Dec 03)
- Re: DNS Pointer - DoS Exploit Florian Weimer (Dec 03)
- Re: DNS Pointer - DoS Exploit Srinivas Naik (Dec 03)