[dns-operations] adns vuln posted
Jon Kibler
Jon.Kibler at aset.com
Mon Aug 4 15:07:03 UTC 2008
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Paul Vixie wrote:
> at <http://downloads.securityfocus.com/vulnerabilities/exploits/30131_zmda.c>
> we see that the "adns" asynchronous stub resolver has enough of a following to
> deserve its own exploit. anybody know the author? this oughta get fixed.
>
Well, at a minimum, this means wireshark is vulnerable!
Jon K
- --
Jon R. Kibler
Chief Technical Officer
Advanced Systems Engineering Technology, Inc.
Charleston, SC USA
o: 843-849-8214
c: 843-224-2494
s: 843-564-4224
My PGP Fingerprint is:
BAA2 1F2C 5543 5D25 4636 A392 515C 5045 CF39 4253
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iEYEARECAAYFAkiXGxcACgkQUVxQRc85QlP6CgCeOR1+kJYuEdHrd29CCACNBIvi
j9IAoIS6vRr+w2/hLdCx1gDGYPOky0HT
=ZyhZ
-----END PGP SIGNATURE-----
==================================================
Filtered by: TRUSTEM.COM's Email Filtering Service
http://www.trustem.com/
No Spam. No Viruses. Just Good Clean Email.
More information about the dns-operations
mailing list