27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to multiple remote overflows\n\nThe remote<br />

BIND server is vulnerable to three different vulnerabilitities : \n1) The remote BIND<br />

server, based on its version number, if running recursive DNS functionality, is vulnerable<br />

to a buffer overflow.\n2) The remote BIND server is vulnerable to a denial of service<br />

(crash) via SIG RR elements with invalid expiry times.\n3) The remote BIND server is<br />

vulnerable to a denial of service.\nWhen a DNS lookup is requested on a non-existant<br />

sub-domain of a valid domain and an OPT resource record with a large UDP payload is<br />

attached, the server may fail.<br />

Solution: Upgrade to BIND 8.3.4 or newer<br />

CVE-2002-1220<br />

ISC BIND < 4.9.7 Inverse-Query Remote Overflow<br />

<strong>PVS</strong> ID: 1007 FAMILY: DNS Servers RISK: HIGH NESSUS ID:10728<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote BIND<br />

server, according to its version number, is vulnerable to an inverse query overflow. An<br />

attacker may use this flaw to gain a root shell on this host.<br />

Solution: Upgrade to BIND 4.9.7 or newer<br />

CVE-1999-0009<br />

ISC BIND < 4.9.5 Multiple DNS Resolver Functions Remote Overflow<br />

<strong>PVS</strong> ID: 1008 FAMILY: DNS Servers RISK: HIGH NESSUS ID:11510<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote BIND<br />

server, according to its version number, is vulnerable to a remote buffer overflow within its<br />

resolver code. An attacker may be able to execute arbitrary code by having the remote DNS<br />

server make a request and send back a malicious DNS response with an invalid length field.<br />

Solution: Upgrade to BIND 4.9.5 or newer<br />

CVE-2002-0684<br />

ISC BIND < 8.2.7 Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 1009 FAMILY: DNS Servers RISK: HIGH NESSUS ID:11152<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote BIND<br />

server is vulnerable to the SIG cached RR overflow vulnerability. An attacker may use this<br />

flaw to gain a shell on this system.<br />

Solution: Upgrade to bind 8.2.7<br />

CVE-2002-1221<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 261

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!