[12519] in bugtraq

home help back first fref pref prev next nref lref last post

Re: BIND NXT Bug Vulnerability

daemon@ATHENA.MIT.EDU (Richard Trott)
Wed Nov 10 18:30:24 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.BSO.4.10.9911101501550.9107-100000@www>
Date:         Wed, 10 Nov 1999 15:03:16 -0800
Reply-To: trott@SLOWPOISONERS.COM
From: Richard Trott <trott@SLOWPOISONERS.COM>
X-To:         Elias Levy <aleph1@SECURITYFOCUS.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <19991110135525.A21417@securityfocus.com>

You might wish to note that there is a fix:  upgrade to 8.2.2 patchlevel
3.

Of course, this will be obvious to anyone who follows the link... but for
those that don't, the "Workaround: None" part will give the wrong
impression.

Rich


On Wed, 10 Nov 1999, Elias Levy wrote:

> http://www.isc.org/products/BIND/bind-security-19991108.html
>
>
> Name: "nxt bug"
>
>    Versions affected:     8.2, 8.2 patchlevel 1, 8.2.1
>    Severity:     CRITICAL
>    Exploitable:     Remotely
>    Type:     Access possible
>
> Description:
>
>    A bug in the processing of NXT records can theoretically allow an
>    attacker to gain access to the system running the DNS server at
>    whatever privilege level the DNS server runs at.
>
> Workarounds:
>
>    None.
>
> Active Exploits:
>
>    At this time, ISC is unaware of any active exploits of this
>    vulnerability however given the potential access this vulnerability
>    represents, it is probable scripts will be created in the near future
>    that make use of this vulnerability.
>
> --
> Elias Levy
> Security Focus
> http://www.securityfocus.com/
>

home help back first fref pref prev next nref lref last post