This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing one or more security
Four problems exists in all versions of ISC BIND 4.9.x prior to 4.9.8
and 8.2.x prior to 8.2.3 (9.x is not affected). Version 8.2.x contains
a buffer overflow in transaction signature (TSIG) handling code that
can be exploited by an attacker to gain unauthorized privileged access
to the system, allowing execution of arbitrary code. BIND 4 contains
both a buffer overflow in the nslookupComplain() function, as well as
an input validation error in the same function. These two flaws in
BIND 4 can result in a Denial of Service or the execution of arbitrary
code if successfully exploited. Finally, both BIND 4 and BIND 8 suffer
from an information leak in the query processing code that allows a
remote attacker to access the program stack, possibly exposing program
and/or environment variables. This flaw is triggered by sending a
specially formatted query to vulnerable BIND servers.
Linux-Mandrake ships with ISC BIND 8 and is therefore vulnerable to
the first and final vulnerabilities previously mentioned. The first
vulnerability is limited because any access gained exploiting it will
result in restricted access due to the named server running as the
user and group named, not as root.
It is highly recommended that all Linux-Mandrake users upgrade BIND
immediately to the latest 8.2.3 version that fixes these
Update the affected bind, bind-devel and / or bind-utils packages.
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now