MaraDNS < 2.0.13 Multiple Vulnerabilities

high Nessus Plugin ID 86674

Synopsis

The DNS server running on the remote host is affected by multiple vulnerabilities.

Description

According to its self-reported version number, the MaraDNS server running on the remote host is prior to 2.0.13. It is, therefore, potentially affected by multiple vulnerabilities :

- A flaw exists in mararc parser due to a buffer underflow condition in the file ParseMaraRc.c. An unauthenticated, remote attacker can exploit this to read from disallowed memory locations.

- A flaw exists in the Deadwood recursive resolver component due to a buffer underflow condition that can allow an out-of-bounds memory location to be overwritten by the output of malloc(). An unauthenticated, remote attacker can exploit this issue to cause a denial of service.

Solution

Upgrade to MaraDNS version 2.0.13 or later

See Also

http://samiam.org/blog/2015-10-08.html

https://github.com/samboy/MaraDNS/issues/19

https://github.com/samboy/MaraDNS/issues/20

https://github.com/samboy/MaraDNS/issues/21

http://maradns.samiam.org/security.html

Plugin Details

Severity: High

ID: 86674

File Name: maradns_2_0_13.nasl

Version: 1.6

Type: remote

Family: DNS

Published: 10/30/2015

Updated: 1/2/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/a:maradns:maradns

Required KB Items: Settings/ParanoidReport, maradns/version, maradns/num_ver

Patch Publication Date: 9/25/2015

Vulnerability Publication Date: 9/23/2015