Vulnerabilities > CVE-2005-0033 - Remote Buffer Overflow vulnerability in ISC Bind 8.4.4/8.4.5
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
Buffer overflow in the code for recursion and glue fetching in BIND 8.4.4 and 8.4.5 allows remote attackers to cause a denial of service (crash) via queries that trigger the overflow in the q_usedns array that tracks nameservers and addresses.
Nessus
NASL family DNS NASL id BIND_Q_USEDNS_OVERFLOW.NASL description The remote bind server, according to its version number, has a buffer overflow involving the last seen 2020-06-01 modified 2020-06-02 plugin id 16260 published 2005-01-26 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/16260 title ISC BIND < 8.4.6 q_usedns Array Remote Overflow DoS code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(16260); script_version("1.23"); script_cvs_date("Date: 2018/06/27 18:42:25"); script_cve_id("CVE-2005-0033"); script_bugtraq_id(12364); script_xref(name:"CERT", value:"327633"); script_name(english:"ISC BIND < 8.4.6 q_usedns Array Remote Overflow DoS"); script_summary(english:"Checks the remote BIND version"); script_set_attribute(attribute:"synopsis", value: "The remote name server is prone to a denial of service attack." ); script_set_attribute(attribute:"description", value: "The remote bind server, according to its version number, has a buffer overflow involving the 'q_usedns' buffer. An attacker may be able to leverage this issue to crash the affected service." ); script_set_attribute(attribute:"solution", value: "Upgrade to bind 8.4.6 or later." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_publication_date", value: "2005/01/26"); script_set_attribute(attribute:"vuln_publication_date", value: "2005/01/25"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"cpe", value:"cpe:/a:isc:bind"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc."); script_family(english: "DNS"); script_dependencie("bind_version.nasl"); script_require_keys("bind/version"); exit(0); } vers = string(get_kb_item("bind/version")); if(!vers)exit(0); if (ereg(string:vers, pattern:"^8\.4\.[4-5]$") ) security_warning(53);
NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_947F4B141C8911DABC01000E0C2E438A.NASL description An ISC advisory reports a buffer overrun vulnerability within bind. The vulnerability could result in a Denial of Service. A workaround is available by disabling recursion and glue fetching. last seen 2020-06-01 modified 2020-06-02 plugin id 21477 published 2006-05-13 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21477 title FreeBSD : bind -- buffer overrun vulnerability (947f4b14-1c89-11da-bc01-000e0c2e438a)
References
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.1/SCOSA-2006.1.txt
- http://secunia.com/advisories/14009
- http://secunia.com/advisories/18291
- http://securitytracker.com/id?1012996
- http://www.isc.org/index.pl?/sw/bind/bind8.php
- http://www.isc.org/index.pl?/sw/bind/bind-security.php
- http://www.kb.cert.org/vuls/id/327633
- http://www.securityfocus.com/bid/12364
- http://www.uniras.gov.uk/niscc/docs/al-20050125-00059.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19063