Mandrake Linux Security Advisory : bind (MDKSA-2001:017)
High Nessus Plugin ID 61891
SynopsisThe remote Mandrake Linux host is missing one or more security updates.
DescriptionFour problems exists in all versions of ISC BIND 4.9.x prior to 4.9.8 and 8.2.x prior to 8.2.3 (9.x is not affected). Version 8.2.x contains a buffer overflow in transaction signature (TSIG) handling code that can be exploited by an attacker to gain unauthorized privileged access to the system, allowing execution of arbitrary code. BIND 4 contains both a buffer overflow in the nslookupComplain() function, as well as an input validation error in the same function. These two flaws in BIND 4 can result in a Denial of Service or the execution of arbitrary code if successfully exploited. Finally, both BIND 4 and BIND 8 suffer from an information leak in the query processing code that allows a remote attacker to access the program stack, possibly exposing program and/or environment variables. This flaw is triggered by sending a specially formatted query to vulnerable BIND servers.
Linux-Mandrake ships with ISC BIND 8 and is therefore vulnerable to the first and final vulnerabilities previously mentioned. The first vulnerability is limited because any access gained exploiting it will result in restricted access due to the named server running as the user and group named, not as root.
It is highly recommended that all Linux-Mandrake users upgrade BIND immediately to the latest 8.2.3 version that fixes these vulnerabilities.
SolutionUpdate the affected bind, bind-devel and / or bind-utils packages.