Prevent crash on unparsable DNS query receive.
authorshort <>
Tue, 18 Jan 2005 00:52:59 +0000 (00:52 +0000)
committershort <>
Tue, 18 Jan 2005 00:52:59 +0000 (00:52 +0000)
netdnsspoof

index 8870079..af67626 100755 (executable)
@@ -70,6 +70,8 @@ sub got_query($$$)
 my($msg,$from_addr,$pktinfo_data)=@_;
 
        my $query=Net::DNS::Packet->new(\$msg);
+       # FIXME: It really occured on hoteltest.
+       do { warn "Failed to parse DNS packet query: ".unpack("H*",$msg); return; } if !$query;
        my $query_id_orig=$query->header()->id();
        my $query_id=id_next();
        $query->header()->id($query_id);