>> Due to the way requests are logged the only way to exploit this >> vulnerability is through setting the DNS name of the fingering host >> to the attacker supplied format string. > I really wonder how you want to exploit this... Last time I checked > all tested resolvers (Linux/BSD/Solaris) did not allow % within > domain names and so your format string vulnerability is not > exploitable at all... If your resolver does not allow "funny characters" in domains, it is broken. If nothing else, that sort of crippling makes it approximately impossible to investigate abuse that involves using such domain names. (At least one spammer outfit is known to use domain names containing control characters and I think at least one other unusual character, prseumably in an attempt to make it harder to investigate their spam.) 0x00 octets in domain labels won't work well with APIs that use C strings, but the resolver shouldn't misbehave when encountering them internally - and breaking on any of the other 255 octets is a Very Bad Idea. (At least in the resolver. Other software and protocols may of course impose their own restrictions, of varying degrees of sanity. But the resolver infrastructure has to support all uses of the DNS, including "unusual" uses.) /~\ The ASCII der Mouse \ / Ribbon Campaign X Against HTML mouse@rodents.montreal.qc.ca / \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B