Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2004-0789 PoC — 多个供应商DNS响应泛滥拒绝服务漏洞

Source
Associated Vulnerability
Title:多个供应商DNS响应泛滥拒绝服务漏洞 (CVE-2004-0789)
Description:DNS协议的多种实现方式存在漏洞,包括:(1)如Posadis所使用的Poslib 1.0.2-1及其以前的版本,(2) 固件3.13以前版本中的AxisNetwork产品,和(3)Men & Mice Suite 2.2.3以前的2.2x版本和3.5.2以前的3.5.x版本,远程攻击者借助(a)具有本地主机的DNS查询包作为一个欺骗性的源地址或者(b)触发一个响应包的应答包,从而触发一个通讯环导致服务拒绝(CPU和网络带宽消耗)。
Readme
```sh
sudo python3 exploit.py
Enter the DNS server IP address: IP
Enter the number of requests to send: NUMBER
```
File Snapshot

[4.0K] /data/pocs/7b333f7ff99c08c7f4fe2945d83f6d5fb8a10f0c ├── [ 441] exploit.py └── [ 115] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.