[11640] in bugtraq

home help back first fref pref prev next nref lref last post

Dynamic DNS Vulnerability

daemon@ATHENA.MIT.EDU (3xT)
Wed Sep 1 21:13:37 1999

Message-Id:  <19990830233619.27537.qmail@securityfocus.com>
Date:         Mon, 30 Aug 1999 23:36:19 -0000
Reply-To: 3xT <awacs@3XT.ORG>
From: 3xT <awacs@3XT.ORG>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM

Sorry, hit enter in the first one thinking it would tab
down.

Here it is:

Currently most inplementations of Dynamic DNS or "DDNS" rely
upon only client IP addresses in an access list for
authentication.  The impact is that anyone can spoof update
packets from a false source address and the server will
happily accept them.   I am going to include the URL to a
tool that can be used to exploit the vulnerability. 
Hopefully vendors will strive to do what's right in a timely
fasion.

Spoofer Utility: http://www.3xt.org/projects

Download ddns.tar.gz from there.

Best Wishes,

-awacs
3xT

home help back first fref pref prev next nref lref last post