Full Disclosure mailing list archives
Re: DNS Pointer - DoS Exploit
From: Srinivas Naik <naik.srinu () gmail com>
Date: Sat, 4 Dec 2010 12:12:42 +0530
Thanks for the input Mr. Weimer I am planning to trigger this exploit and wandering how to construct such a packet. Ultimate goal is to make a client request which can cause this effect. If possible, scripting ideas would be helpful. Cheers, Naik On Fri, Dec 3, 2010 at 10:22 PM, Florian Weimer <fweimer () bfk de> wrote:
* Srinivas Naik:A DNS packet with a pointer loop is a protocol anomaly which someprogramsmay not handle gracefully.Try this: 00 00 00 00 00 01 00 00 00 00 00 00 C0 0C -- Florian Weimer <fweimer () bfk de> BFK edv-consulting GmbH http://www.bfk.de/ Kriegsstraße 100 tel: +49-721-96201-1 D-76133 Karlsruhe fax: +49-721-96201-99
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- DNS Pointer - DoS Exploit Srinivas Naik (Dec 03)
- Re: DNS Pointer - DoS Exploit Cal Leeming [Simplicity Media Ltd] (Dec 03)
- Re: DNS Pointer - DoS Exploit Florian Weimer (Dec 03)
- Re: DNS Pointer - DoS Exploit Srinivas Naik (Dec 03)