Debian DSA-1795-1 : ldns - buffer overflow

medium Nessus Plugin ID 38723

Synopsis

The remote Debian host is missing a security-related update.

Description

Stefan Kaltenbrunner discovered that ldns, a library and set of utilities to facilitate DNS programming, did not correctly implement a buffer boundary check in its RR DNS record parser. This weakness could enable overflow of a heap buffer if a maliciously-crafted record is parsed, potentially allowing the execution of arbitrary code. The scope of compromise will vary with the context in which ldns is used, and could present either a local or remote attack vector.

Solution

Upgrade the ldns packages.

The old stable distribution (etch) is not affected by this issue.

For the stable distribution (lenny), this problem has been fixed in version 1.4.0-1+lenny1.

See Also

https://www.debian.org/security/2009/dsa-1795

Plugin Details

Severity: Medium

ID: 38723

File Name: debian_DSA-1795.nasl

Version: 1.10

Type: local

Agent: unix

Published: 5/11/2009

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:ldns, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 5/7/2009

Reference Information

CVE: CVE-2009-1086

CWE: 399

DSA: 1795