MaraDNS 1.2.12.06 / 1.3.05 Wildcard Resource Record Remote DoS

medium Nessus Plugin ID 73477

Synopsis

The DNS server running on the remote host is affected by a denial of service vulnerability.

Description

According to its self-reported version number, the MaraDNS server running on the remote host is affected by a memory leak issue when handling wildcard records. This issue could allow a remote attacker to cause a remote denial of service by querying for wildcard records.

Note that issue only affects hosts with 'bind_star_handling' set to '2' in the configuration file.

Solution

Upgrade to MaraDNS version 1.2.12.07 / 1.3.06 or later, apply the relevant patch, or refer to the vendor for a workaround.

See Also

http://www.nessus.org/u?6ed2f95c

http://comments.gmane.org/gmane.network.dns.maradns.general/1112

http://maradns.samiam.org/security.html

http://maradns.samiam.org/changelog-2006-2010.html

Plugin Details

Severity: Medium

ID: 73477

File Name: maradns_1_3_06.nasl

Version: 1.3

Type: remote

Family: DNS

Published: 4/11/2014

Updated: 7/14/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/a:maradns:maradns

Required KB Items: maradns/version, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 8/16/2007

Vulnerability Publication Date: 5/23/2007

Reference Information

CVE: CVE-2007-3116

BID: 24337

CWE: 399