Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-2776 PoC — ISC BIND 安全漏洞

Source
Associated Vulnerability
Title:ISC BIND 安全漏洞 (CVE-2016-2776)
Description:ISC BIND是美国Internet Systems Consortium(ISC)公司所维护的一套实现了DNS协议的开源软件。 ISC BIND中的named中的buffer.c文件存在安全漏洞,该漏洞源于程序没有正确构造响应。远程攻击者可借助特制的查询利用该漏洞造成拒绝服务(断言失败和守护进程退出)。以下版本受到影响:ISC BIND 9.9.9-P3之前的9版本,9.10.4-P3之前的9.10.x版本,9.11.0rc3之前的9.11.x版本。
Description
CVE-2016-2776
Readme
# CVE-2016-2776
A tale of a DNS Packet, a detailed walk-thru and proof of concept of BIND's CVE-2016-2776.

http://blog.infobytesec.com/2016/10/a-tale-of-dns-packet-cve-2016-2776.html

In this repository you will find:

* Proof-of-Concept (namedown.py)
* Metasploit Auxiliary Module (namedown.rb)
File Snapshot

[4.0K] /data/pocs/1afdf26f254d4d7524495c10baaf73ce53ddd2cf ├── [2.1K] namedown.py ├── [4.3K] namedown.rb └── [ 297] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.