Executive Summary
Summary | |
---|---|
Title | New version of BIND 8 released |
Informations | |||
---|---|---|---|
Name | DSA-026 | First vendor Publication | 2001-01-29 |
Vendor | Debian | Last vendor Modification | 2001-01-29 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
BIND 8 suffered from several buffer overflows. It is possible to construct an inverse query that allows the stack to be read remotely exposing environment variables. CERT has disclosed information about these issues. A new upstream version fixes this. Due to the complexity of BIND we have decided to make an exception to our rule by releasin the new upstream source to our stable distribution. We recommend you upgrade your bind packages immediately. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 2.2 alias potato |
Original Source
Url : http://www.debian.org/security/2001/dsa-026 |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 026-1 (bind) File : nvt/deb_026_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
14795 | ISC BIND TSIG Handling Code Remote Overflow |
1751 | ISC BIND Environment Variable Information Disclosure |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Bind Buffer Overflow named tsig overflow attempt RuleID : 314-community - Revision : 23 - Type : SERVER-OTHER |
2014-01-10 | Bind Buffer Overflow named tsig overflow attempt RuleID : 314 - Revision : 23 - Type : SERVER-OTHER |
2014-01-10 | Bind Buffer Overflow named tsig overflow attempt RuleID : 303-community - Revision : 24 - Type : SERVER-OTHER |
2014-01-10 | Bind Buffer Overflow named tsig overflow attempt RuleID : 303 - Revision : 24 - Type : SERVER-OTHER |
2014-01-10 | TCP inverse query RuleID : 2922-community - Revision : 12 - Type : PROTOCOL-DNS |
2014-01-10 | TCP inverse query RuleID : 2922 - Revision : 12 - Type : PROTOCOL-DNS |
2014-01-10 | UDP inverse query RuleID : 2921-community - Revision : 12 - Type : PROTOCOL-DNS |
2014-01-10 | UDP inverse query RuleID : 2921 - Revision : 12 - Type : PROTOCOL-DNS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-026.nasl - Type : ACT_GATHER_INFO |
2001-01-29 | Name : It is possible to use the remote name server to break into the remote host. File : bind_covert_overflows.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:25:19 |
|