Korean
<< Back
VID 19017
Severity 40
Port 53
Protocol UDP
Class DNS
Detailed Description The BIND daemon, according to its version number, has a buffer overflow vulnerability in the 'q_usedns' buffer. ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet. BIND versions 8.4.4 and 8.4.5 are vulnerable to a buffer overflow vulnerability in the handling of the 'q_usedns' array used by the server to track nameservers and addresses that have been queried. A remote attacker could exploit this vulnerability by sending a malicious request that includes an excessively long name server address. It might allow the attacker to trigger a denial of service condition or possibly execute arbitrary code on the affected system.

* Note: This check solely relied on the version number of the remote BIND server to assess this vulnerability, so this might be a false positive.

* References:
http://www.isc.org/index.pl?/sw/bind/bind-security.php
http://www.kb.cert.org/vuls/id/327633
http://www.niscc.gov.uk/niscc/docs/al-20050125-00059.html?lang=en

* Platforms Affected:
ISC BIND 8.4.4
ISC BIND 8.4.5
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of ISC BIND (8.4.6 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/index.pl?/sw/bind/
Related URL CVE-2005-0033 (CVE)
Related URL 12364 (SecurityFocus)
Related URL (ISS)