| VID |
19007 |
| Severity |
40 |
| Port |
53 |
| Protocol |
TCP,UDP |
| Class |
DNS |
| Detailed Description |
The BIND daemon, according to its version number, is vulnerable to several attacks that can allow an attacker to gain root or go down the system remotely.
¨ç nxt bug : Since BIND 8.2 releases occur a buffer overflow when an improperly query for a NXT record performs, it can allow an attacker to gain a shell. ¨è sig bug : Since BIND 4.9.5~8.x releases do not perform the proper authentification for a SIG record, attackers can down the named servers by exploiting with it. ¨é so_linger bug : Attackers can hold named servers from operating during 120 seconds by cutting off TCP sessiones on purpose. ¨ê fdmax bug : Attackers can down named servers by consuming over the number of the particular files to manage. ¨ë maxdname bug : Attackers can down named servers by handling with an improper method for arbitrary data copied from the network. ¨ì naptr bug : An named server can be downed by the local user obtained the permission to write.
* References: http://www.cert.org/advisories/CA-99-14-bind.html |
| Recommendation |
Upgrade to the latest version |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|