Synopsis
The remote server is vulnerable to several flaws.
Description
The remote server seems to be running SheerDNS 1.0.0 or older.
This version is vulnerable to several flaws allowing :
- A remote attacker to read certain files with predefined names (A, PTR, CNAME, ...)
- A local attacker to read the first line of arbitrary files with the privileges of the DNS server (typically root)
- A local attacker to execute arbitrary code through a buffer overflow
Solution
Upgrade to SheerDNS 1.0.1 or disable this service
Plugin Details
File Name: sheerdns_traversal.nasl
Supported Sensors: Nessus
Vulnerability Information
Required KB Items: DNS/udp/53
Exploit Ease: Exploits are available
Vulnerability Publication Date: 4/13/2003