Bug 9681 - DNS Name parse loop
Summary: DNS Name parse loop
Status: NEW
Alias: None
Product: uClibc
Classification: Unclassified
Component: Networking (show other bugs)
Version: 0.9.33.2
Hardware: All All
: P5 normal
Target Milestone: ---
Assignee: unassigned
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2017-03-01 08:35 UTC by yifeng1118
Modified: 2017-03-02 00:29 UTC (History)
2 users (show)

See Also:
Host:
Target:
Build:


Attachments
wireshark parse file (6.91 KB, image/png)
2017-03-01 08:35 UTC, yifeng1118
Details

Note You need to log in before you can comment on or make changes to this bug.
Description yifeng1118 2017-03-01 08:35:41 UTC
Created attachment 6901 [details]
wireshark parse file

p/x *packet@packet_len
$19 = {0x0, 0x2, 0x81, 0x80, 0x0, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4, 
0x6c, 0x69, 0x76, 0x65, 0x7, 0x67, 0x33, 0x70, 0x72, 0x6f, 0x78, 0x79, 0x7, 
0x6c, 0x65, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x3, 0x63, 0x6f, 0x6d, 0x0, 0x0, 
0x1, 0x0, 0x1, 0xc0, 0xc, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x2, 0x4b, 0x0, 0x4, 
0x1, 0x7a, 0xc0, 0x11, 0xc0, 0x3a, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xad, 
0x0, 0x4, 0x6f, 0xce, 0xd3, 0xe0, 0x1, 0x7a, 0x7, 0x67, 0x33, 0x70, 0x72, 
0x6f, 0x78, 0x79, 0x7, 0x6c, 0x65, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x3, 0x43, 
0x6f, 0x6d, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xad, 0x0, 0x4, 0x6f, 
0xce, 0xd3, 0xb1, 0xc0, 0x3a, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xad, 0x0, 
0x4, 0x7b, 0x7d, 0x24, 0xfb, 0xc0, 0x3a, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 
0xad, 0x0, 0x4, 0x7b, 0x7d, 0x24, 0xe5}

1,0xc0 0x3a :this name poiner cause to loop in function "decode_dotted"(ulibc 0.9.33-2)
2,glibc mofify this bug !Refer :ns_name_unpack