search menu icon-carat-right cmu-wordmark

CERT Coordination Center

NSD vulnerable to one-byte overflow

Vulnerability Note VU#710316

Original Release Date: 2009-05-20 | Last Revised: 2009-06-01

Overview

A vulnerability exists in the way NSD processes certain types of packets that may lead to a one-byte buffer overflow.

Description

Name server daemon (NSD) is an open source name server developed by NLnet Labs. NSD contains an off-by-one error that can cause a one-byte buffer overflow when certain packets are processed. The vulnerability exits in the packet_read_query_section() function in packet.c in versions 3.x and in the process_query_section() function in query.c in versions 2.x.

Note that this issue affects NSD versions 2.0.0 through 3.2.1.

Impact

A remote, unauthenticated attacker may be able to cause the DNS software to crash resulting in a denial-of-service condition.

Solution

Apply patch

NLnet Labs has released NSD version 3.2.2 and patches for versions 3.2.1 and 2.3.7. More information and links to these patches can be found in NLnet Labs NSD Announcement.

Users are encouraged to check with their vendor to determine the appropriate patch or update to apply.

Vendor Information

710316
 

View all 89 vendors View less vendors


CVSS Metrics

Group Score Vector
Base 0 AV:--/AC:--/Au:--/C:--/I:--/A:--
Temporal 0 E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)
Environmental 0 CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)

References

Acknowledgements

This issue was reported in NLnet Labs NSD Announcement.

This document was written by Chris Taschner.

Other Information

CVE IDs: None
Severity Metric: 8.40
Date Public: 2009-05-18
Date First Published: 2009-05-20
Date Last Updated: 2009-06-01 19:41 UTC
Document Revision: 10

Sponsored by CISA.