Vulnerabilities > CVE-2000-0887 - Unspecified vulnerability in ISC Bind 8.2.2
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
named in BIND 8.2 through 8.2.2-P6 allows remote attackers to cause a denial of service by making a compressed zone transfer (ZXFR) request and performing a name service query on an authoritative record that is not cached, aka the "zxfr bug."
Exploit-Db
description | BIND 8.2.2-P5 Denial of Service Vulnerability. CVE-2000-0887. Dos exploit for linux platform |
id | EDB-ID:20388 |
last seen | 2016-02-02 |
modified | 2000-11-01 |
published | 2000-11-01 |
reporter | Fabio Pietrosanti |
source | https://www.exploit-db.com/download/20388/ |
title | BIND 8.2.2-P5 - Denial of Service Vulnerability |
Nessus
NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2000-067.NASL description A vulnerability exists with the bind nameserver dealing with compressed zone transfers. This vulnerability can be exploited by authorized zone transfers and used in a DoS attack. The named daemon will crash if it receives this type of zone transfer from an authorized source address. The crash is not necessarily immediate, but can range from a few seconds to a few minutes from the time of the attack. This new version of bind also fixes a bug in the handling of the compression pointer tables which can result in the nameserver entering an infinite loop. This bug has been known to occur in the standard processing of SRV records used with Windows 2000 Active Directory. All Linux-Mandrake users are encouraged to upgrade bind immediately. last seen 2020-06-01 modified 2020-06-02 plugin id 61853 published 2012-09-06 reporter This script is Copyright (C) 2012-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/61853 title Mandrake Linux Security Advisory : bind (MDKSA-2000:067) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Mandrake Linux Security Advisory MDKSA-2000:067. # The text itself is copyright (C) Mandriva S.A. # include("compat.inc"); if (description) { script_id(61853); script_version("1.5"); script_cvs_date("Date: 2019/08/02 13:32:46"); script_cve_id("CVE-2000-0887", "CVE-2000-0888"); script_xref(name:"MDKSA", value:"2000:067"); script_name(english:"Mandrake Linux Security Advisory : bind (MDKSA-2000:067)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Mandrake Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "A vulnerability exists with the bind nameserver dealing with compressed zone transfers. This vulnerability can be exploited by authorized zone transfers and used in a DoS attack. The named daemon will crash if it receives this type of zone transfer from an authorized source address. The crash is not necessarily immediate, but can range from a few seconds to a few minutes from the time of the attack. This new version of bind also fixes a bug in the handling of the compression pointer tables which can result in the nameserver entering an infinite loop. This bug has been known to occur in the standard processing of SRV records used with Windows 2000 Active Directory. All Linux-Mandrake users are encouraged to upgrade bind immediately." ); script_set_attribute( attribute:"solution", value:"Update the affected bind, bind-devel and / or bind-utils packages." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:bind"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:bind-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:bind-utils"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:6.0"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:6.1"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:7.0"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:7.1"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:7.2"); script_set_attribute(attribute:"patch_publication_date", value:"2000/11/10"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/09/06"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2012-2019 Tenable Network Security, Inc."); script_family(english:"Mandriva Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux"); if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu); flag = 0; if (rpm_check(release:"MDK6.0", cpu:"i386", reference:"bind-8.2.2P7-1.3mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK6.0", cpu:"i386", reference:"bind-devel-8.2.2P7-1.3mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK6.0", cpu:"i386", reference:"bind-utils-8.2.2P7-1.3mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK6.1", cpu:"i386", reference:"bind-8.2.2P7-1.2mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK6.1", cpu:"i386", reference:"bind-devel-8.2.2P7-1.2mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK6.1", cpu:"i386", reference:"bind-utils-8.2.2P7-1.2mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK7.0", cpu:"i386", reference:"bind-8.2.2P7-1.2mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK7.0", cpu:"i386", reference:"bind-devel-8.2.2P7-1.2mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK7.0", cpu:"i386", reference:"bind-utils-8.2.2P7-1.2mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK7.1", cpu:"i386", reference:"bind-8.2.2P7-1.2mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK7.1", cpu:"i386", reference:"bind-devel-8.2.2P7-1.2mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK7.1", cpu:"i386", reference:"bind-utils-8.2.2P7-1.2mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK7.2", cpu:"i386", reference:"bind-8.2.2P7-1.1mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK7.2", cpu:"i386", reference:"bind-devel-8.2.2P7-1.1mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK7.2", cpu:"i386", reference:"bind-utils-8.2.2P7-1.1mdk", yank:"mdk")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family DNS NASL id BIND_ZXFR_BUG.NASL description The remote BIND server, according to its version number, is vulnerable to the last seen 2020-06-01 modified 2020-06-02 plugin id 10549 published 2000-11-12 reporter This script is Copyright (C) 2000-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/10549 title ISC BIND < 8.2.2-P7 Compressed ZXFR Name Service Query DoS
Redhat
advisories |
|
References
- http://archives.neohapsis.com/archives/bugtraq/2000-11/0217.html
- http://archives.neohapsis.com/archives/linux/suse/2000-q4/0657.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000338
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000339
- http://frontal2.mandriva.com/security/advisories?name=MDKSA-2000:067
- http://www.cert.org/advisories/CA-2000-20.html
- http://www.debian.org/security/2000/20001112
- http://www.redhat.com/support/errata/RHSA-2000-107.html
- http://www.securityfocus.com/archive/1/143843
- http://www.securityfocus.com/bid/1923
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5540