[14822] in bugtraq
Re: tcpdump workaround against dnsloop exploit.
daemon@ATHENA.MIT.EDU (David Schwartz)
Sun May 7 14:41:24 2000
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <000001bfb7a8$3a0ea410$021d85d1@youwant.to>
Date: Sat, 6 May 2000 15:12:54 -0700
Reply-To: David Schwartz <davids@WEBMASTER.COM>
From: David Schwartz <davids@WEBMASTER.COM>
X-To: THE INFAMOUS <evil7@BELLSOUTH.NET>, BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <00050317325100.00442@sQa.speedbros.org>
This won't work. It stops an A->A->A loop but allows an A->B->A->B loop.
What you want is something more like:
> + /*
> + * If we got two time the same data ptr,
> + * or are being referred forward,
> + * this means we may loop.
> + */
> + if ( cp >= old)
> + return NULL;
> + old = cp;
DS