lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3752fbcb0708241138l5810827fh21b8abd09700c7fd@mail.gmail.com>
Date: Sat, 25 Aug 2007 04:38:27 +1000
From: "herbietwink whatsitworth2ya" <herbietwink@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: bind9 remote vulnerability,
	possibly exploitable - vendor unresponsive :~~~<

..#@1 [x] \\\\\\\\\/\/3ZTc04ztC00ol3Rcr3w @#@#$@#$ .[x].


if ur queer and ur not sure u know it - clap ur handz
is what i'd say

if i had immunity shaved in the back if my head
..and i was undecided as to whether i wanted to sink the pink or the brown
....itz ok i hire young euro entourage boys at a bargin price


WC crU ready to drop some threatc0n5 shit more serious then a gadi evron
threat at defcon presentation *  5
cuntz g0t right amougzt it rem0te shell bind9 r00ter, uneed more inf0? read
the c0de n00b lololol

pr0pz 2 mixt3r foundin father of int33ger skullduggry

READY
&
GO @#$$%


struct dns_rdata {
    unsigned char *            data;
    int                             length;
    dns_rdataclass_t        rdclass;
    dns_rdatatype_t            type;
    int                               flags;
    ISC_LINK(dns_rdata_t)        link;
};


isc_result_t
dns_rdata_towire(dns_rdata_t *rdata, dns_compress_t *cctx,
         isc_buffer_t *target)
{
    isc_result_t result = ISC_R_NOTIMPLEMENTED;
    isc_boolean_t use_default = ISC_FALSE;
    isc_region_t tr;
    isc_buffer_t st;

    REQUIRE(rdata != NULL);
    REQUIRE(DNS_RDATA_VALIDFLAGS(rdata));

    /*
     * Some DynDNS meta-RRs have empty rdata.
     */
    if ((rdata->flags & DNS_RDATA_UPDATE) != 0) {
        INSIST(rdata->length == 0);
        return (ISC_R_SUCCESS);
    }

    st = *target;

    TOWIRESWITCH

    if (use_default) {
        isc_buffer_availableregion(target, &tr);
        if (tr.length < rdata->length)
            return (ISC_R_NOSPACE);
        memcpy(tr.base, rdata->data, rdata->length);
        isc_buffer_add(target, rdata->length);
        return (ISC_R_SUCCESS);
    }
    if (result != ISC_R_SUCCESS) {
        *target = st;
        INSIST(target->used < 65536);
        dns_compress_rollback(cctx, (isc_uint16_t)target->used);
    }
    return (result);
}



bigup2  Lam3rZ's see u at nonamecon

Herbert Twinkleworth
*Information Security Interest Group - NZ

*

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ