Overview
Buffer overflow vulnerabilities exists in the DNS stub resolver library used by BSD, ISC BIND, and GNU glibc. Other systems that use DNS resolver code derived from ISC BIND may also be affected. An attacker who is able to control DNS responses could exploit arbitrary code or cause a denial of service on vulnerable systems.
Description
The Domain Name System (DNS) provides name, address, and other information about Internet Protocol (IP) networks and devices. By issuing queries to and interpreting responses from DNS servers, IP-enabled network operating systems can access DNS information. When an IP network application needs to access or process DNS information, it calls functions in the stub resolver library, which may be part of the underlying network operating system. On BSD-based systems, DNS stub resolver functions are implemented in the system library libc. In ISC BIND, they are implemented in libbind. On GNU/Linux-based systems, they are implemented in glibc. The DNS resolver libraries on BSD-based systems (libc), ISC BIND (libbind), GNU/Linux (glibc), and possibly other systems that use code derived from ISC BIND contain buffer overflow vulnerabilities in the way the resolver handles DNS responses. This document specifically addresses a buffer overflow that can ocur when stub resolvers process DNS responses for network name and address resolution.
Note that any application that uses a vulnerable resolver library is likely to be affected. Applications that are statically linked must be recompiled using patched resolver libraries. |
Impact
An attacker who is able to control DNS responses could exploit arbitrary code or cause a denial of service on vulnerable systems. The attacker would need to be able to spoof DNS responses or control a DNS server that provides responses to a vulnerable system. Any code executed by the attacker would run with the privileges of the process that called the vulnerable resolver function, potentially root. |
Solution
|
Use of a local caching DNS server is not an effective workaround |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.pine.nl/advisories/pine-cert-20020601.asc
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:28.resolv.asc
- ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA2002-006.txt.asc
- http://www.securityfocus.com/bid/5100
- http://www.ietf.org/rfc/rfc1034.txt
- http://www.ietf.org/rfc/rfc1035.txt
- http://www.ietf.org/rfc/rfc2136.txt
- http://www.gnu.org/manual/glibc-2.2.5/html_node/Name-Service-Switch.html
Acknowledgements
The CERT/CC thanks PINE-CERT for reporting this vulnerability and the GNU glibc developers for information used in this document.
This document was written by Art Manion.
Other Information
CVE IDs: | CVE-2002-0684 |
CERT Advisory: | CA-2002-19 |
Severity Metric: | 29.72 |
Date Public: | 2002-06-26 |
Date First Published: | 2002-08-01 |
Date Last Updated: | 2002-08-28 01:57 UTC |
Document Revision: | 38 |