ISC BIND < 9.2.2 DNS Resolver Functions Remote Overflow

critical Nessus Plugin ID 11318

Synopsis

It is possible to use the remote name server to break into the remote host.

Description

The remote BIND 9 DNS server, according to its version number, is vulnerable to a buffer overflow which may allow an attacker to gain a shell on this host or to disable this server.

Solution

Upgrade to BIND 9.2.2 or downgrade to the 8.x series

See Also

https://www.isc.org/downloads/bind/

https://archive.cert.uni-stuttgart.de/bugtraq/2003/03/msg00075.html

Plugin Details

Severity: Critical

ID: 11318

File Name: bind9_overflow.nasl

Version: 1.26

Type: remote

Family: DNS

Published: 3/4/2003

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:isc:bind

Required KB Items: bind/version

Vulnerability Publication Date: 7/4/2002

Reference Information

CVE: CVE-2002-0684

CERT: 542971

CERT-CC: CA-2002-19