Korean
<< Back
VID 19007
Severity 40
Port 53
Protocol TCP,UDP
Class DNS
Detailed Description The BIND daemon, according to its version number, is vulnerable to several attacks that can allow an attacker to gain root or go down the system remotely.

¨ç nxt bug : Since BIND 8.2 releases occur a buffer overflow when an improperly query for a NXT record performs, it can allow an attacker to gain a shell.
¨è sig bug : Since BIND 4.9.5~8.x releases do not perform the proper authentification for a SIG record, attackers can down the named servers by exploiting with it.
¨é so_linger bug : Attackers can hold named servers from operating during 120 seconds by cutting off TCP sessiones on purpose.
¨ê fdmax bug : Attackers can down named servers by consuming over the number of the particular files to manage.
¨ë maxdname bug : Attackers can down named servers by handling with an improper method for arbitrary data copied from the network.
¨ì naptr bug : An named server can be downed by the local user obtained the permission to write.

* References:
http://www.cert.org/advisories/CA-99-14-bind.html
Recommendation Upgrade to the latest version
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)