Vulnerabilities > CVE-2000-0887 - Unspecified vulnerability in ISC Bind 8.2.2

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
isc
nessus
exploit available

Summary

named in BIND 8.2 through 8.2.2-P6 allows remote attackers to cause a denial of service by making a compressed zone transfer (ZXFR) request and performing a name service query on an authoritative record that is not cached, aka the "zxfr bug."

Vulnerable Configurations

Part Description Count
Application
Isc
1

Exploit-Db

descriptionBIND 8.2.2-P5 Denial of Service Vulnerability. CVE-2000-0887. Dos exploit for linux platform
idEDB-ID:20388
last seen2016-02-02
modified2000-11-01
published2000-11-01
reporterFabio Pietrosanti
sourcehttps://www.exploit-db.com/download/20388/
titleBIND 8.2.2-P5 - Denial of Service Vulnerability

Nessus

  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2000-067.NASL
    descriptionA vulnerability exists with the bind nameserver dealing with compressed zone transfers. This vulnerability can be exploited by authorized zone transfers and used in a DoS attack. The named daemon will crash if it receives this type of zone transfer from an authorized source address. The crash is not necessarily immediate, but can range from a few seconds to a few minutes from the time of the attack. This new version of bind also fixes a bug in the handling of the compression pointer tables which can result in the nameserver entering an infinite loop. This bug has been known to occur in the standard processing of SRV records used with Windows 2000 Active Directory. All Linux-Mandrake users are encouraged to upgrade bind immediately.
    last seen2020-06-01
    modified2020-06-02
    plugin id61853
    published2012-09-06
    reporterThis script is Copyright (C) 2012-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/61853
    titleMandrake Linux Security Advisory : bind (MDKSA-2000:067)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Mandrake Linux Security Advisory MDKSA-2000:067. 
    # The text itself is copyright (C) Mandriva S.A.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(61853);
      script_version("1.5");
      script_cvs_date("Date: 2019/08/02 13:32:46");
    
      script_cve_id("CVE-2000-0887", "CVE-2000-0888");
      script_xref(name:"MDKSA", value:"2000:067");
    
      script_name(english:"Mandrake Linux Security Advisory : bind (MDKSA-2000:067)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Mandrake Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "A vulnerability exists with the bind nameserver dealing with
    compressed zone transfers. This vulnerability can be exploited by
    authorized zone transfers and used in a DoS attack. The named daemon
    will crash if it receives this type of zone transfer from an
    authorized source address. The crash is not necessarily immediate, but
    can range from a few seconds to a few minutes from the time of the
    attack.
    
    This new version of bind also fixes a bug in the handling of the
    compression pointer tables which can result in the nameserver entering
    an infinite loop. This bug has been known to occur in the standard
    processing of SRV records used with Windows 2000 Active Directory.
    
    All Linux-Mandrake users are encouraged to upgrade bind immediately."
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected bind, bind-devel and / or bind-utils packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:bind");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:bind-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:bind-utils");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:6.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:6.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:7.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:7.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:7.2");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2000/11/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/09/06");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2019 Tenable Network Security, Inc.");
      script_family(english:"Mandriva Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
    if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"MDK6.0", cpu:"i386", reference:"bind-8.2.2P7-1.3mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK6.0", cpu:"i386", reference:"bind-devel-8.2.2P7-1.3mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK6.0", cpu:"i386", reference:"bind-utils-8.2.2P7-1.3mdk", yank:"mdk")) flag++;
    
    if (rpm_check(release:"MDK6.1", cpu:"i386", reference:"bind-8.2.2P7-1.2mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK6.1", cpu:"i386", reference:"bind-devel-8.2.2P7-1.2mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK6.1", cpu:"i386", reference:"bind-utils-8.2.2P7-1.2mdk", yank:"mdk")) flag++;
    
    if (rpm_check(release:"MDK7.0", cpu:"i386", reference:"bind-8.2.2P7-1.2mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK7.0", cpu:"i386", reference:"bind-devel-8.2.2P7-1.2mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK7.0", cpu:"i386", reference:"bind-utils-8.2.2P7-1.2mdk", yank:"mdk")) flag++;
    
    if (rpm_check(release:"MDK7.1", cpu:"i386", reference:"bind-8.2.2P7-1.2mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK7.1", cpu:"i386", reference:"bind-devel-8.2.2P7-1.2mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK7.1", cpu:"i386", reference:"bind-utils-8.2.2P7-1.2mdk", yank:"mdk")) flag++;
    
    if (rpm_check(release:"MDK7.2", cpu:"i386", reference:"bind-8.2.2P7-1.1mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK7.2", cpu:"i386", reference:"bind-devel-8.2.2P7-1.1mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK7.2", cpu:"i386", reference:"bind-utils-8.2.2P7-1.1mdk", yank:"mdk")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyDNS
    NASL idBIND_ZXFR_BUG.NASL
    descriptionThe remote BIND server, according to its version number, is vulnerable to the
    last seen2020-06-01
    modified2020-06-02
    plugin id10549
    published2000-11-12
    reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/10549
    titleISC BIND < 8.2.2-P7 Compressed ZXFR Name Service Query DoS

Redhat

advisories
rhsa
idRHSA-2000:107