High Nessus Plugin ID 13765
SynopsisThe remote host is missing a vendor-supplied security patch
DescriptionThe remote host is missing the patch for the advisory SUSE-SA:2002:044 (bind8).
The security research company ISS (Internet Security Services) has discovered several vulnerabilities in the BIND8 name server, including a remotely exploitable buffer overflow.
1. There is a buffer overflow in the way named handles SIG records. This buffer overflow can be exploited to obtain access to the victim host under the account the named process is running with.
2. There are several Denial Of Service problems in BIND8 that allow remote attackers to terminate the name server process.
Both vulnerabilities are addressed by this update, using patches originating from ISC.