Re: [Full-disclosure] Buffer Overflow in dnsmap 0.22 - DNS Network Mapper by pagvac (gnucitizen.org)



Dear Jason Starks,

It can be exploited remote via XXS it the attack vectors API's and framework
made by PDP, btw great work PDP and gnucitizen.org security team, keep up
the good work. I now try to attach gdb to javascript to do remove
exploatation of dnsmap



On Wed, Feb 25, 2009 at 6:10 PM, Jason Starks <jstarks440@xxxxxxxxx> wrote:

I'm going to say dnsmap isn't suid or sguid, and a segmentation fault can
occur after triggering a simple programming error (you've shown no signs of
code execution). Terrrrrrrific.

On Wed, Feb 25, 2009 at 10:36 AM, srl <security.research.labs@xxxxxxxxx>wrote:

Security Advisory:

PRODUCT
************
http://www.gnucitizen.org/blog/new-version-of-dnsmap-out/
http://www.gnucitizen.org/static/blog/2009/02/dnsmap-022.tar

This this is a great tool, used by the two pentesters, pagvac and pdp

TECHNICAL DESCRIPTION
********************************
A local buffer overflow exist in dnsmap 0.22.
$ dnsmap -r `perl -e 'print "A"x250'`
dnsmap 0.22 - DNS Network Mapper by pagvac (gnucitizen.org)

Segmentation fault

SOLUTION
*************
Wait until pagvac will learn about strncpy().











_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/