ISC BIND < 4.9.5 DNS Resolver Functions Remote Overflow

critical Nessus Plugin ID 11510

Language:

Synopsis

It is possible to use the remote name server to execute arbitrary code on the remote host.

Description

The remote BIND server, according to its version number, is vulnerable to a remote buffer overflow within its resolver code.

An attacker may be able to execute arbitrary code by having the remote DNS server make a request and send back a malicious DNS response with an invalid length field.

Solution

Upgrade to BIND 4.9.5 or later

See Also

http://www.securityfocus.com/advisories/308

Plugin Details

Severity: Critical

ID: 11510

File Name: bind_resolver_overflow.nasl

Version: 1.22

Type: remote

Family: DNS

Published: 4/3/2003

Updated: 6/27/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:isc:bind

Required KB Items: bind/version

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 7/4/2002

Reference Information

CVE: CVE-2002-0684

BID: 7228