Korean
<< Back
VID 19016
Severity 30
Port 53
Protocol UDP
Class DNS
Detailed Description The DNS server appears to be vulnerable to a Response Flooding Denial Of Service Vulnerability.
The Domain Name System (DNS) protocol is an Internet service that translates domain names into Internet Protocol (IP) addresses. Multiple DNS vendors are reported susceptible to a denial of service vulnerability. This vulnerability results in vulnerable DNS servers entering into an infinite query and response message loop, leading to the consumption of network and CPU resources, and denying DNS service to legitimate users. An attacker may exploit this flaw by finding two vulnerable servers and set up a 'ping-pong' attack between the two hosts.
In addition, by sending these implementations a query that appears to originate from the localhost on UDP port 53, the server will respond to itself and will keep responding to these responses, hence entering a loop which can exhaust system resources and hence result in a denial-of-service attack.

* References:
http://www.uniras.gov.uk/vuls/2004/758884/index.htm

* Platforms Affected:
Axis Communications, Axis 2100 Network Camera 2.42
Axis Communications, Axis 2110 Network Camera 2.42
Axis Communications, Axis 2120 Network Camera 2.42
Axis Communications, Axis 2401+ Network Video Server Release 3.13
Axis Communications, Axis 2420 Network Camera 2.42
Axis Communications, Axis 2460 Network DVR Release 3.13
Men & Mice, QuickDNS Server prior to 2.2.3
Men & Mice, QuickDNS Server prior to 3.5.2
Posadis, Poslib prior to 1.0.2-1
SourceForge.net, DNRD prior to 2.11
null, Axis 2400+ Network Video Server Release 3.13
MaraDNS 0.8.05 and earlier
Don Moore MyDNS 0.10.0 and earlier
DeleGate 8.9.5 and earlier
Any operating system Any version
Recommendation For Axis:
Apply the latest firmware version, available from the Axis Firmware Technical Support Web page at http://www.axis.com/techsup/firmware.php

For DeleGate:
Upgrade to the latest version (8.9.6 or later) of DeleGate, available from DeleGate Download FTP site at ftp://ftp.delegate.org/pub/DeleGate/

For Don Moore MyDNS:
Upgrade to the latest version (0.11.0 or later) of MyDNS, available from MyDNS Download Web site at http://mydns.bboy.net/download/

For MaraDNS:
Upgrade to the latest version (0.9.05 or later) of MaraDNS, available from MaraDNS Download Web site at http://www.maradns.org/download/

For DNRD:
Upgrade to the latest version of DNRD (2.11 or later), available from the SourceForge.net Web site at http://sourceforge.net/projects/dnrd/

For QuickDNS Server prior to 2.2.3:
Upgrade to the latest version of QuickDNS Server (2.2.3 or later), available from the Men and Mice FTP site at ftp://ftp.menandmice.com/pub/quickdns/old/

For QuickDNS Server prior to 3.5.2:
Upgrade to the latest version of QuickDNS Server (3.5.2 or later), available from the Men and Mice FTP site at ftp://ftp.menandmice.com/pub/quickdns/

For Poslib:
Upgrade to the latest version of Poslib (1.0.2-1 or later), available from the Posadis Download Web page at http://www.posadis.org/security/pos_adv_006.txt

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2004-0789 (CVE)
Related URL 11642 (SecurityFocus)
Related URL 17996,17997 (ISS)