DNS: SCO Openserver named Buffer Overflow (1)

The DNS daemon (named) shipped with several versions of SCO Openserver is vulnerable to a buffer overflow attack. Successful exploitation of this attack will result in the attacker gaining control of the victim with permissions of the user running named. This affects SCO OpenServer 5.0.5 and prior versions using the same named.

Extended Description

Successful exploitation would allow for arbitrary code injection and execution with the root privileges of the server process. Code injection that does not result in execution would crash the application due to memory corruption and would result in the denial of service condition.

Short Name
DNS:OVERFLOW:SCO-NAMED2-OF1
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
DNS
Keywords
(1) Buffer CVE-2001-0588 Openserver Overflow SCO named
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3324
False Positive
Unknown
CVSS Score

4.6

Found a potential security threat?