DNS: Red Hat Enterprise Linux DNS Resolver Buffer Overflow
This signature detects attempts to exploit a known vulnerability against DNS stub resolver library in ISC BIND. A successful attack can lead to arbitrary code execution.
Extended Description
ISC BIND (Berkeley Internet Name Domain) is vulnerable to a buffer overflow condition. The vulnerability exists in the DNS stub resolver library in ISC BIND. The BIND 4 resolver library contains buffer overflows in functions that are responsible for network name and address requests. The consequences of this vulnerability will be highly dependant on the details of individual applications using libc. It is likely that exploitation will allow a malicious DNS server to execute arbitrary code with privileges of the vulnerable process. Under some conditions, this may grant an attacker local access, possibly as a privileged user.
Affected Products
Avaya s8500,Isc bind
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Compaq
Gnu
Sun
Hp
Xerox
Avaya
Sgi
Astaro
Isc
Ibm
7.5