BIND 8 suffered from several buffer overflows It is
possible to construct an inverse query that allows the stack to be read
remotely exposing environment variables CERT has disclosed information about
these issues A new upstream version fixes this Due to the complexity of BIND
we have decided to make an exception to our rule by releasing the ne ...
/*## copyright LAST STAGE OF DELIRIUM feb 2001 poland *://lsd-plnet/ #*/
/*## bind 82 821 822 822-PX Slackware 40/RedHat 62 #*/
/* The code establishes a TCP connection with port 53 of a target system */
/* It makes use of the "infoleak" bug (through UDP) to obtain the base */
/* value of the named pro ...
/*
* This exploit has been fixed and extensive explanation and clarification
* added
* Cleanup done by:
* Ian Goldberg <ian@cypherpunksca>
* Jonathan Wilkins <jwilkins@bitlandnet>
* NOTE: the default installation of RedHat 62 seems to not be affected
* due to the compiler options If BIND is built from source the ...
/*
* tsig0wnc
* Copyright Field Marshal August Wilhelm Anton Count Neithardt von Gneisenau
* gneisenau@berlincom
* The author is not and will not be held responsible for the action of
* other people using this code
* provided for informational purposes only
* since a greetz section is de rigeur
* greets to my luv scharnie, sheib, darkx, ...
/*## copyright LAST STAGE OF DELIRIUM feb 2001 poland *://lsd-plnet/ #*/
/*## bind 82 821 822 822-PX Solaris 27 x86 #*/
/* The code establishes a TCP connection with port 53 of a target system */
/* It makes use of the "infoleek" bug (through UDP) to obtain the base */
/* value of the named pro ...