Vulnerabilities > CVE-2005-0033 - Remote Buffer Overflow vulnerability in ISC Bind 8.4.4/8.4.5

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
isc
nessus

Summary

Buffer overflow in the code for recursion and glue fetching in BIND 8.4.4 and 8.4.5 allows remote attackers to cause a denial of service (crash) via queries that trigger the overflow in the q_usedns array that tracks nameservers and addresses.

Vulnerable Configurations

Part Description Count
Application
Isc
2

Nessus

  • NASL familyDNS
    NASL idBIND_Q_USEDNS_OVERFLOW.NASL
    descriptionThe remote bind server, according to its version number, has a buffer overflow involving the
    last seen2020-06-01
    modified2020-06-02
    plugin id16260
    published2005-01-26
    reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/16260
    titleISC BIND < 8.4.6 q_usedns Array Remote Overflow DoS
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    include("compat.inc");
    
    if (description)
    {
     script_id(16260);
     script_version("1.23");
     script_cvs_date("Date: 2018/06/27 18:42:25");
    
     script_cve_id("CVE-2005-0033");
     script_bugtraq_id(12364);
     script_xref(name:"CERT", value:"327633");
     
     script_name(english:"ISC BIND < 8.4.6 q_usedns Array Remote Overflow DoS");
     script_summary(english:"Checks the remote BIND version");
     
     script_set_attribute(attribute:"synopsis", value:
    "The remote name server is prone to a denial of service attack." );
     script_set_attribute(attribute:"description", value:
    "The remote bind server, according to its version number, has a buffer
    overflow involving the 'q_usedns' buffer.  An attacker may be able to
    leverage this issue to crash the affected service." );
     script_set_attribute(attribute:"solution", value:
    "Upgrade to bind 8.4.6 or later." );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"false");
     script_set_attribute(attribute:"plugin_publication_date", value: "2005/01/26");
     script_set_attribute(attribute:"vuln_publication_date", value: "2005/01/25");
     script_set_attribute(attribute:"plugin_type", value:"remote");
     script_set_attribute(attribute:"cpe", value:"cpe:/a:isc:bind");
     script_end_attributes();
     
     script_category(ACT_GATHER_INFO);
     script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
     script_family(english: "DNS");
     script_dependencie("bind_version.nasl");
     script_require_keys("bind/version");
     exit(0);
    }
    
    vers = string(get_kb_item("bind/version"));
    if(!vers)exit(0);
    
    if (ereg(string:vers, pattern:"^8\.4\.[4-5]$") )
      security_warning(53);
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_947F4B141C8911DABC01000E0C2E438A.NASL
    descriptionAn ISC advisory reports a buffer overrun vulnerability within bind. The vulnerability could result in a Denial of Service. A workaround is available by disabling recursion and glue fetching.
    last seen2020-06-01
    modified2020-06-02
    plugin id21477
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21477
    titleFreeBSD : bind -- buffer overrun vulnerability (947f4b14-1c89-11da-bc01-000e0c2e438a)