[12567] in bugtraq

home help back first fref pref prev next nref lref last post

Re: your mail

daemon@ATHENA.MIT.EDU (Firstname Lastname)
Sat Nov 13 21:55:36 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.10.9911121207150.11963-100000@thrash.clan-rum.org>
Date:         Fri, 12 Nov 1999 12:25:54 -0500
Reply-To: teak@THRASH.CLAN-RUM.ORG
From: Firstname Lastname <teak@THRASH.CLAN-RUM.ORG>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <199911110238.DAA24292@sofuku.monster.org>

On Thu, 11 Nov 1999, Anonymous wrote:

> Ooh, those pesky NXT records.  Like I process those every day.
> Fascinating read in RFC 2535, but suppose I don't have any NXT
> records in my own zones, under what circumstances will my DNS server
> commit the sin of "the processing of NXT records"?  In other words,
> are all of us vulnerable (even caching-only name servers if so, I
> imagine!), or only people with NXT records?  This makes a big difference!

I won't go into exact details of exploiting the vuln. because it gets
kinda hairy, but it's a real threat.
I can get EIP on multiple versions of BIND. tested so far:

  812-t3b, 812-t4b, 812, and 821

exploit has failed on a particular 812 binary i have, but a recent 812
binary (both of these bins compiled from source retrieved from isc.org)
was exploitable. go figure. i also have an 812-t3b binary which the
exploit does not work on. so far, i can't find a pattern as to which
versions of bind actually process NXT RR's. as i said, i had two binaries
of 812 release--one processed NXT RR's and the other didn't.

the overflow takes place processing *ANY* answer from another nameserver.
all the answer needs to contain is a properly formatted NXT record. it
doesn't matter whether it answers the question, but the answer name must
match the queried name.

nimrood

home help back first fref pref prev next nref lref last post