BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (spoof on ircd)(情報元のブックマーク数)

DNS脆弱性のExploitがまた出ています。

/* h0dns_spoof.c - zmda - saik0pod@yahoo.com
* - spoof dns on ircd's using the h0dns code
*
* - spoof dns on anything using the adns (asynchronous dns resolver) code
*
* - The bug:
* - Static source port used by the adns code
* - Sequential DNS ids in request packets
*
* - Initiate sequence to trigger a dns lookup by the adns resolver. Send
* the same range of spoofed DNS ids in a constant flood spoofed as the
* primary DNS server for the host. Even a local DNS request will take
* long enough to allow some amount of the spoofed DNS responses through
* before the primary DNS responds. Since the resolver does not cache
* results, the dns lookups can be triggered until the DNS id is
* incremented within the DNS id range being spoofed.
*
*/

http://www.milw0rm.com/exploits/6197

screenshot