[10707] in bugtraq

home help back first fref pref prev next nref lref last post

Re: weaknesses in dns label decoding,

daemon@ATHENA.MIT.EDU (marka@ISC.ORG)
Thu Jun 3 12:04:03 1999

Message-Id: <199906030134.LAA00214@bsdi.dv.isc.org>
Date: 	Thu, 3 Jun 1999 11:34:25 +1000
Reply-To: marka@ISC.ORG
From: marka@ISC.ORG
X-To:         Dag-Erling Smorgrav <des@ifi.uio.no>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  Your message of "Wed, 02 Jun 1999 20:45:09 +0200." 
              <xzpwvxmv3uy.fsf@hrotti.ifi.uio.no>

> bobk <bobk@SINISTER.COM> writes:
> > Imagine what could happen if some program did a strcmp() on the following
> > name:
> >
> > rs.internic.net\0.xa.net
> >
> > where, of course, \0 is a null
> >
> > Interested readers may ponder what type of programs may be exploited with
> > this type of attack.
>
> Any .rhosts consumer. Xhost. Amanda (.amandahosts). Lpd (lpd.allow).
> What did I win?
>
> DES
> --
> Dag-Erling Smorgrav - des@ifi.uio.no
>
	If if you have a modern resolver library you won't have a
	problem as the presentation form is literally
	"rs.internic.net\000.xa.net".

	This may be used with old libraries to hide were you came
	from but access checks usually require a forward lookups as
	well .rhosts etc. should not be a problem even with old
	libraries.

	Mark
--
Mark Andrews, Internet Software Consortium
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

home help back first fref pref prev next nref lref last post