DNS: BIND NXT Overflow (BSD)

This signature detects attempts to exploit a known vulnerability in Bind, a popular DNS daemon, when running on BSD. Attackers can send maliciously crafted NXT records that cannot be properly valided by the server to gain root access (if BIND is running as root [default]).

Extended Description

There are several vulnerabilities in recent BIND packages (pre 8.2.2). The first is a buffer overflow condition which is a result of BIND improperly validating NXT records. The consequence of this being exploited is a remote root compromise (assuming that BIND is running as root, which is default). The second is a denial of service which can occur if BIND does not validate SIG records properly. The next is a bug which allows attackers to cause BIND to consume more file descriptors than can be managed, causing named to crash. The fourth vulnerability is another denial of service which can be caused locally if certain permission conditions are met when validating zone information loaded from disk files. The last is a vulnerability which has to do with closing TCP sockets. If protocols for doing so are not adhered to, BIND can be paused for 120 seconds at a time.

Affected Products

Sgi irix

References

BugTraq: 788

CVE: CVE-1999-0835

Short Name
DNS:BIND-NXT-OVERFLOW3
Severity
Minor
Recommended
False
Recommended Action
None
Category
DNS
Keywords
(BSD) BIND CVE-1999-0835 NXT Overflow bid:788
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Sgi

Isc

Sun

CVSS Score

10.0

Found a potential security threat?