Executive Summary

Summary
Title MaraDNS: Arbitrary code execution
Informations
Name GLSA-201111-06 First vendor Publication 2011-11-20
Vendor Gentoo Last vendor Modification 2011-11-20
Severity (Vendor) High Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

A buffer overflow vulnerability in MaraDNS allows remote attackers to execute arbitrary code or cause a Denial of Service.

Background

MaraDNS is a proxy DNS server with permanent caching.

Description

A long DNS hostname with a large number of labels could trigger a buffer overflow in the compress_add_dlabel_points() function of dns/Compress.c.

Impact

A remote unauthenticated attacker could execute arbitrary code or cause a Denial of Service.

Workaround

There is no known workaround at this time.

Resolution

All MaraDNS users should upgrade to the latest stable version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/maradns-1.4.06"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since February 12, 2011. It is likely that your system is already no longer affected by this issue.

References

[ 1 ] CVE-2011-0520 : http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0520

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201111-06.xml

Original Source

Url : http://security.gentoo.org/glsa/glsa-201111-06.xml

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12685
 
Oval ID: oval:org.mitre.oval:def:12685
Title: DSA-2196-1 maradns -- buffer overflow
Description: Witold Baryluk discovered that MaraDNS, a simple security-focused Domain Name Service server, may overflow an internal buffer when handling requests with a large number of labels, causing a server crash and the consequent denial of service.
Family: unix Class: patch
Reference(s): DSA-2196-1
CVE-2011-0520
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): maradns
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2

OpenVAS Exploits

Date Description
2012-02-12 Name : Gentoo Security Advisory GLSA 201111-06 (MaraDNS)
File : nvt/glsa_201111_06.nasl
2011-05-12 Name : Debian Security Advisory DSA 2196-1 (maradns)
File : nvt/deb_2196_1.nasl
2011-03-05 Name : FreeBSD Ports: maradns
File : nvt/freebsd_maradns0.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
70630 MaraDNS dns/Compress.c compress_add_dlabel_points() Function Remote Overflow DoS

MaraDNS is prone to an overflow condition. The 'compress_add_dlabel_points()' function in 'dns/Compress.c' fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted request, a remote attacker can potentially cause a denial of service.

Nessus® Vulnerability Scanner

Date Description
2014-04-11 Name : The DNS server running on the remote host is affected by a buffer overflow vu...
File : maradns_2_0_02.nasl - Type : ACT_GATHER_INFO
2011-11-22 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201111-06.nasl - Type : ACT_GATHER_INFO
2011-03-21 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2196.nasl - Type : ACT_GATHER_INFO
2011-02-01 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_8015600f2c8011e09cc100163e5bf4f9.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:37:05
  • Multiple Updates