Join GitHub today
GitHub is home to over 20 million developers working together to host and review code, manage projects, and build software together.
DoS in POC #1
Conversation
hdm
commented
Feb 16, 2016
|
@secretsquirrel Have you requested a CVE? This looks serious! |
secretsquirrel
commented
Feb 16, 2016
|
@hdm Just doing my part. |
fenner
commented on CVE-2015-7547-poc.py in 7600b54
Feb 18, 2016
|
In fact, dnsmasq can send the TCP request in multiple segments, resulting in a single read of length 1 and then another read of the rest of the data. One cheesy way to work around this (which still allows the proof of concept to work against glibc) is to time.sleep( 5 ) before calling conn.recv(), to allow the data to coalesce in the socket buffer before you try to read it. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
secretsquirrel commentedFeb 16, 2016
My CVE-2015-7547 POC POC
The cause of this crash is a due to an unbounds check in processed data, assuming that at least four bytes of data are sent in the DNS request. This causes a DoS condition in the POC, potentially stopping users from using the POC in hostile environments.