[Bug 9681] New: DNS Name parse loop
bugzilla at busybox.net
bugzilla at busybox.net
Wed Mar 1 08:35:41 UTC 2017
https://bugs.busybox.net/show_bug.cgi?id=9681
Bug ID: 9681
Summary: DNS Name parse loop
Product: uClibc
Version: 0.9.33.2
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: Networking
Assignee: unassigned at uclibc.org
Reporter: yifeng1118 at 126.com
CC: uclibc-cvs at uclibc.org
Target Milestone: ---
Created attachment 6901
--> https://bugs.busybox.net/attachment.cgi?id=6901&action=edit
wireshark parse file
p/x *packet at packet_len
$19 = {0x0, 0x2, 0x81, 0x80, 0x0, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4,
0x6c, 0x69, 0x76, 0x65, 0x7, 0x67, 0x33, 0x70, 0x72, 0x6f, 0x78, 0x79, 0x7,
0x6c, 0x65, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x3, 0x63, 0x6f, 0x6d, 0x0, 0x0,
0x1, 0x0, 0x1, 0xc0, 0xc, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x2, 0x4b, 0x0, 0x4,
0x1, 0x7a, 0xc0, 0x11, 0xc0, 0x3a, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xad,
0x0, 0x4, 0x6f, 0xce, 0xd3, 0xe0, 0x1, 0x7a, 0x7, 0x67, 0x33, 0x70, 0x72,
0x6f, 0x78, 0x79, 0x7, 0x6c, 0x65, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x3, 0x43,
0x6f, 0x6d, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xad, 0x0, 0x4, 0x6f,
0xce, 0xd3, 0xb1, 0xc0, 0x3a, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xad, 0x0,
0x4, 0x7b, 0x7d, 0x24, 0xfb, 0xc0, 0x3a, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0,
0xad, 0x0, 0x4, 0x7b, 0x7d, 0x24, 0xe5}
1,0xc0 0x3a :this name poiner cause to loop in function "decode_dotted"(ulibc
0.9.33-2)
2,glibc mofify this bug !Refer :ns_name_unpack
--
You are receiving this mail because:
You are on the CC list for the bug.
More information about the uClibc-cvs
mailing list