Multiple IRCd DNS Denial of Service Vulnerability
BID:2086
Info
Multiple IRCd DNS Denial of Service Vulnerability
| Bugtraq ID: | 2086 |
| Class: | Boundary Condition Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 06 2000 12:00AM |
| Updated: | Dec 06 2000 12:00AM |
| Credit: | This vulnerability was announced via Bugtraq by David Luyer <[email protected]> on December 6, 2000. |
| Vulnerable: |
Sean Kelly Cyclone IRCd 0.0.4 p1 Roger Yerramsetti Austhex IRCd 7.5 DALnet Bahamut IRCd 4.6.7 |
| Not Vulnerable: | |
Discussion
Multiple IRCd DNS Denial of Service Vulnerability
DreamForge IRCd is an IRC daemon designed for the Dalnet IRC Network, and maintained by the Dalnet IRCd Team. A problem with the daemon allows users to remotely crash the daemon.
The problem occurs in the dns resolution code included as part of the daemon. A buffer overflow exists in the routine that reverse-resolves an IP address. Upon the return of a 128 byte A Record to the IRCd after attempting to resolve an IP address, the daemon dies. This allows a malicious user with control of their own DNS to crash the IRC daemon, resulting in a Denial of Service to legitimate users. This vulnerability potentially impacts other IRC daemons that are derivatives of the original Dreamforge source.
DreamForge IRCd is an IRC daemon designed for the Dalnet IRC Network, and maintained by the Dalnet IRCd Team. A problem with the daemon allows users to remotely crash the daemon.
The problem occurs in the dns resolution code included as part of the daemon. A buffer overflow exists in the routine that reverse-resolves an IP address. Upon the return of a 128 byte A Record to the IRCd after attempting to resolve an IP address, the daemon dies. This allows a malicious user with control of their own DNS to crash the IRC daemon, resulting in a Denial of Service to legitimate users. This vulnerability potentially impacts other IRC daemons that are derivatives of the original Dreamforge source.
Exploit / POC
Multiple IRCd DNS Denial of Service Vulnerability
Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].