DNS: Red Hat Enterprise Linux DNS Resolver Buffer Overflow

This signature detects attempts to exploit a known vulnerability against DNS stub resolver library in ISC BIND. A successful attack can lead to arbitrary code execution.

Extended Description

ISC BIND (Berkeley Internet Name Domain) is vulnerable to a buffer overflow condition. The vulnerability exists in the DNS stub resolver library in ISC BIND. The BIND 4 resolver library contains buffer overflows in functions that are responsible for network name and address requests. The consequences of this vulnerability will be highly dependant on the details of individual applications using libc. It is likely that exploitation will allow a malicious DNS server to execute arbitrary code with privileges of the vulnerable process. Under some conditions, this may grant an attacker local access, possibly as a privileged user.

Affected Products

Avaya s8500,Isc bind

References

BugTraq: 6186

CVE: CVE-2002-0029

Short Name
DNS:RESOLVER-BO
Severity
Major
Recommended
False
Recommended Action
Drop
Category
DNS
Keywords
Buffer CVE-2002-0029 DNS Enterprise Hat Linux Overflow Red Resolver bid:6186
Release Date
10/01/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Red_hat

Compaq

Gnu

Sun

Hp

Xerox

Avaya

Sgi

Astaro

Isc

Ibm

CVSS Score

7.5

Found a potential security threat?