Korean
<< Back
VID 19013
Severity 40
Port 53
Protocol TCP,UDP
Class DNS
Detailed Description The BIND daemon, according to its version number, is vulnerable to an inverse query overflow, and enables the Inverse Query (IQUERY) feature. BIND versions prior to 4.9.7 and BIND versions prior to 8.1.2 are vulnerable to this vulnerability. By sending a maliciously formatted DNS message, a remote attacker can overflow a buffer and cause the BIND server to crash. The attacker also can use this vulnerability to execute arbitrary code on the affected system with root privileges.

* Note: This check solely relied on the version number of the remote BIND Server to assess this vulnerability, so this might be a false positive.

* References:
http://www.cert.org/advisories/CA-98.05.bind_problems.html

* Platforms Affected:
BIND 4 releases prior to 4.9.7
BIND 8 releases prior to 8.1.2
Recommendation Configure the affected DNS server to disable inverse queries. See the document at http://www.acmebw.com/resources/papers/securing.pdf

-- AND --

Upgrade to the latest version of BIND or apply the appropriate patch for your system, as listed in CERT advisory CA-98.05.bind_problems at http://www.cert.org/advisories/CA-98.05.bind_problems.html .
Related URL CVE-1999-0009 (CVE)
Related URL 134 (SecurityFocus)
Related URL 895 (ISS)