Overview
A vulnerability in BIND, repaired in verison 8.2.2p5, allows remote attackers to execute code with the privileges of the process running named. This vulnerability was widely exploited from November 1999 to December 2000.
Description
There is a buffer overflow in the processing of NXT records in the routine rrextract, part of the file ns_resp.c. Specifically, in vulnerable versions of BIND, there is a section of code which reads: An exploit for this vulnerability is publicly available . |
Impact
Remote user may gain default process access of local nameserver, usually root |
Solution
Upgrade to the latest version of BIND. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Our thanks to ISC for assistance in understanding this vulnerability.
This document was written by Shawn V Hernan.
Other Information
CVE IDs: | CVE-1999-0833 |
CERT Advisory: | CA-1999-14 |
Severity Metric: | 108.16 |
Date Public: | 1999-11-10 |
Date First Published: | 2001-01-28 |
Date Last Updated: | 2006-02-03 22:28 UTC |
Document Revision: | 7 |