
Full Disclosure mailing list archives
bind9 remote vulnerability, possibly exploitable - vendor unresponsive :~~~<
From: "herbietwink whatsitworth2ya" <herbietwink () gmail com>
Date: Sat, 25 Aug 2007 04:38:27 +1000
..#@1 [x] \\\\\\\\\/\/3ZTc04ztC00ol3Rcr3w @#@#$@#$ .[x]. if ur queer and ur not sure u know it - clap ur handz is what i'd say if i had immunity shaved in the back if my head ..and i was undecided as to whether i wanted to sink the pink or the brown ....itz ok i hire young euro entourage boys at a bargin price WC crU ready to drop some threatc0n5 shit more serious then a gadi evron threat at defcon presentation * 5 cuntz g0t right amougzt it rem0te shell bind9 r00ter, uneed more inf0? read the c0de n00b lololol pr0pz 2 mixt3r foundin father of int33ger skullduggry READY & GO @#$$% struct dns_rdata { unsigned char * data; int length; dns_rdataclass_t rdclass; dns_rdatatype_t type; int flags; ISC_LINK(dns_rdata_t) link; }; isc_result_t dns_rdata_towire(dns_rdata_t *rdata, dns_compress_t *cctx, isc_buffer_t *target) { isc_result_t result = ISC_R_NOTIMPLEMENTED; isc_boolean_t use_default = ISC_FALSE; isc_region_t tr; isc_buffer_t st; REQUIRE(rdata != NULL); REQUIRE(DNS_RDATA_VALIDFLAGS(rdata)); /* * Some DynDNS meta-RRs have empty rdata. */ if ((rdata->flags & DNS_RDATA_UPDATE) != 0) { INSIST(rdata->length == 0); return (ISC_R_SUCCESS); } st = *target; TOWIRESWITCH if (use_default) { isc_buffer_availableregion(target, &tr); if (tr.length < rdata->length) return (ISC_R_NOSPACE); memcpy(tr.base, rdata->data, rdata->length); isc_buffer_add(target, rdata->length); return (ISC_R_SUCCESS); } if (result != ISC_R_SUCCESS) { *target = st; INSIST(target->used < 65536); dns_compress_rollback(cctx, (isc_uint16_t)target->used); } return (result); } bigup2 Lam3rZ's see u at nonamecon Herbert Twinkleworth *Information Security Interest Group - NZ *
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- bind9 remote vulnerability, possibly exploitable - vendor unresponsive :~~~< herbietwink whatsitworth2ya (Aug 24)