On Tue, 12 Nov 2019, Niall.oReilly+lists--- via curl-library wrote:

The very long name (`const char *bad = "this.is.` _et seq_.) is invalid according to RFCs 1034 and 1035 both because it is too long and because it contains embedded zero-length labels (which are represented by consecutive dots). A strict encoder should reject it early, and so frustrate the attempt to force a buffer overflow.

Ah! We should probably A) fix that and refuse such names with zero labels and B) update the used host names in the test...

A validly encoded pure (without EDNS) single query must fit in 272 (12 + 256 + 4) octets, which is well below the buffer size of 512 provided in `struct dnsprobe`.

Then maybe that's an additional fix if we have no other reason for a larger buffer!

--

 / daniel.haxx.se | Get the best commercial curl support there is - from me
                  | Private help, bug fixes, support, ports, new features
                  | https://www.wolfssl.com/contact/
-------------------------------------------------------------------
Unsubscribe: https://cool.haxx.se/list/listinfo/curl-library
Etiquette:   https://curl.haxx.se/mail/etiquette.html

Reply via email to