shift or die

security. photography. foobar.

Updates on dproxy and Xing

I guess I owe you some updates ... My buffer overflow exploit is published (advisory, Metasploit module), it was about dproxy, a small caching DNS proxy. A few days later, mu-b published an exploit for dproxy-nexgen. His exploit is much worse because dproxy-nexgen is the version that is used in a number of WLAN APs. I've tried the exploit and contacted the vendors who are known to use it (Linksys, Asus, Netgear, AVM) on March 31st. So far, I only got an answer from Linksys (who were the only ones where I could easily find an E-Mail address for security purposes, too) saying that they are investigating the report. If anyone knows any more boxes that use dproxy, please let me know.

My little Xing hack is fixed, too. My guess is that they got tipped of by someone who was pointed to this blog entry ...