Vulnerabilities > CVE-2002-0651 - Buffer Overflow vulnerability in ISC Bind 9.4.0

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
isc
nessus

Summary

Buffer overflow in the DNS resolver code used in libc, glibc, and libbind, as derived from ISC BIND, allows remote malicious DNS servers to cause a denial of service and possibly execute arbitrary code via the stub resolvers.

Vulnerable Configurations

Part Description Count
Application
Isc
1

Nessus

  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2002-038.NASL
    descriptionA vulnerability was discovered in the BIND9 DNS server in versions prior to 9.2.1. An error condition will trigger the shutdown of the server when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL as expected. This condition causes the server to assert an error message and shutdown the BIND server. The error condition can be remotely exploited by a special DNS packet. This can only be used to create a Denial of Service on the server; the error condition is correctly detected, so it will not allow an attacker to execute arbitrary code on the server. Update : Sascha Kettler noticed that the version of BIND9 supplied originally was in fact 9.2.1RC1 and mis-labelled as 9.2.1. The packages provided in this update are BIND 9.2.1 final. Likewise, the buffer overflow in the DNS resolver libraries, as noted in MDKSA-2002:043, has also been fixed. Thanks to Bernhard Rosenkraenzer at Red Hat for backporting the patches from 8.3.3 to 9.2.1.
    last seen2020-06-01
    modified2020-06-02
    plugin id13943
    published2004-07-31
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/13943
    titleMandrake Linux Security Advisory : bind (MDKSA-2002:038-1)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2002-050.NASL
    descriptionA buffer overflow vulnerability was found in the way that the glibc resolver handles the resolution of network names and addresses via DNS in glibc versions 2.2.5 and earlier. Only systems using the
    last seen2020-06-01
    modified2020-06-02
    plugin id13953
    published2004-07-31
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/13953
    titleMandrake Linux Security Advisory : glibc (MDKSA-2002:050)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2002-119.NASL
    descriptionVersion 9 of ISC BIND, prior to version 9.2.1, contained a denial of service (DoS) attack vulnerability. Various versions of the ISC BIND resolver libraries are vulnerable to a buffer overflow attack. ISC BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named) -- which resolves hostnames to IP addresses, a resolver library (routines for applications to use when interfacing with DNS), and various tools. Versions of BIND 9 prior to 9.2.1 have a bug that causes certain requests to the BIND name server to fail an internal consistency check, causing the name server to stop responding to requests. This can be used by a remote attacker to cause a denial of service (DoS) attack against name servers. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2002-0400 to this issue. A buffer overflow vulnerability exists in multiple implementations of DNS resolver libraries. Applications that utilize vulnerable DNS resolver libraries may be affected. A remote attacker who is able to send malicious DNS responses could potentially exploit this vulnerability to execute arbitrary code or cause a denial of service (DoS) attack on a vulnerable system. Red Hat Linux does not ship with any applications or libraries that link against the BIND resolver libraries; however, third party code may be affected. (CVE-2002-0651) Red Hat Linux Advanced Server shipped with a version of ISC BIND vulnerable to both of these issues. All users of BIND are advised to upgrade to the errata packages containing BIND 9.2.1 which contains backported patches that correct these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id12635
    published2004-07-06
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/12635
    titleRHEL 2.1 : bind (RHSA-2002:119)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2002-167.NASL
    descriptionUpdated glibc packages are available which fix a buffer overflow in the XDR decoder and two vulnerabilities in the resolver functions. [updated 8 aug 2002] Updated packages have been made available, as the original errata introduced a bug which could cause calloc() to crash on 32-bit platforms when passed a size of 0. These updated errata packages contain a patch to correct this bug. The glibc package contains standard libraries which are used by multiple programs on the system. Sun RPC is a remote procedure call framework which allows clients to invoke procedures in a server process over a network. XDR is a mechanism for encoding data structures for use with RPC. NFS, NIS, and other network services that are built upon Sun RPC. The glibc package contains an XDR encoder/decoder derived from Sun
    last seen2020-06-01
    modified2020-06-02
    plugin id12318
    published2004-07-06
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/12318
    titleRHEL 2.1 : glibc (RHSA-2002:167)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2002-043.NASL
    descriptionA buffer overflow vulnerability exists in different implementations of the DNS resolver libraries. A remote attacker able to sent malicious DNS responses could potentially exploit this vulnerability to execute arbitrary code or cause a DoS (Denial of Service) on a vulnerable system. The named daemon itself is not vulnerable to this problem, but this latest version of bind 8 includes fixes to the DNS resolver libraries.
    last seen2020-06-01
    modified2020-06-02
    plugin id61917
    published2012-09-06
    reporterThis script is Copyright (C) 2012-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/61917
    titleMandrake Linux Security Advisory : bind (MDKSA-2002:043)

Oval

accepted2005-03-09T07:56:00.000-04:00
classvulnerability
contributors
nameBrian Soby
organizationThe MITRE Corporation
descriptionBuffer overflow in the DNS resolver code used in libc, glibc, and libbind, as derived from ISC BIND, allows remote malicious DNS servers to cause a denial of service and possibly execute arbitrary code via the stub resolvers.
familyunix
idoval:org.mitre.oval:def:4190
statusaccepted
submitted2005-01-19T12:00:00.000-04:00
titleBuffer Overflow in DNS Resolver Library
version35

Redhat

advisories
  • rhsa
    idRHSA-2002:119
  • rhsa
    idRHSA-2002:133
  • rhsa
    idRHSA-2002:139
  • rhsa
    idRHSA-2002:167
  • rhsa
    idRHSA-2003:154