[Bug 9681] New: DNS Name parse loop

bugzilla at busybox.net bugzilla at busybox.net
Wed Mar 1 08:35:41 UTC 2017


https://bugs.busybox.net/show_bug.cgi?id=9681

            Bug ID: 9681
           Summary: DNS Name parse loop
           Product: uClibc
           Version: 0.9.33.2
          Hardware: All
                OS: All
            Status: NEW
          Severity: normal
          Priority: P5
         Component: Networking
          Assignee: unassigned at uclibc.org
          Reporter: yifeng1118 at 126.com
                CC: uclibc-cvs at uclibc.org
  Target Milestone: ---

Created attachment 6901
  --> https://bugs.busybox.net/attachment.cgi?id=6901&action=edit
wireshark parse file

p/x *packet at packet_len
$19 = {0x0, 0x2, 0x81, 0x80, 0x0, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4, 
0x6c, 0x69, 0x76, 0x65, 0x7, 0x67, 0x33, 0x70, 0x72, 0x6f, 0x78, 0x79, 0x7, 
0x6c, 0x65, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x3, 0x63, 0x6f, 0x6d, 0x0, 0x0, 
0x1, 0x0, 0x1, 0xc0, 0xc, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x2, 0x4b, 0x0, 0x4, 
0x1, 0x7a, 0xc0, 0x11, 0xc0, 0x3a, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xad, 
0x0, 0x4, 0x6f, 0xce, 0xd3, 0xe0, 0x1, 0x7a, 0x7, 0x67, 0x33, 0x70, 0x72, 
0x6f, 0x78, 0x79, 0x7, 0x6c, 0x65, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x3, 0x43, 
0x6f, 0x6d, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xad, 0x0, 0x4, 0x6f, 
0xce, 0xd3, 0xb1, 0xc0, 0x3a, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xad, 0x0, 
0x4, 0x7b, 0x7d, 0x24, 0xfb, 0xc0, 0x3a, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 
0xad, 0x0, 0x4, 0x7b, 0x7d, 0x24, 0xe5}

1,0xc0 0x3a :this name poiner cause to loop in function "decode_dotted"(ulibc
0.9.33-2)
2,glibc mofify this bug !Refer :ns_name_unpack

-- 
You are receiving this mail because:
You are on the CC list for the bug.


More information about the uClibc-cvs mailing list