Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2002-119: bind


Vulnerability Assessment Details

RHSA-2002-119: bind

Vulnerability Assessment Summary
Check for the version of the bind packages

Detailed Explanation for this Vulnerability Assessment


Version 9 of ISC BIND, prior to version 9.2.1, contained a denial of
service (DoS) attack vulnerability. Various versions of the ISC BIND
resolver libraries are vulnerable to a buffer overflow attack.

ISC BIND (Berkeley Internet Name Domain) is an implementation of the DNS
(Domain Name System) protocols. BIND includes a DNS server (named) --
which resolves hostnames to IP addresses, a resolver library
(routines for applications to use when interfacing with DNS), and
various tools.

Versions of BIND 9 prior to 9.2.1 have a bug that causes certain requests
to the BIND name server to fail an internal consistency check, causing the
name server to stop responding to requests. This can be used by a remote
attacker to cause a denial of service (DoS) attack against name servers.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2002-0400 to this issue.

A buffer overflow vulnerability exists in multiple implementations of DNS
resolver libraries. Applications that utilize vulnerable DNS resolver
libraries may be affected. A remote attacker who is able to send malicious
DNS responses could potentially exploit this vulnerability to execute
arbitrary code or cause a denial of service (DoS) attack on a vulnerable
system. Red Hat Linux does not ship with any applications or libraries that
link against the BIND resolver libraries
however, third party code may be
affected. (CVE-2002-0651)

Red Hat Linux Advanced Server shipped with a version of ISC BIND vulnerable
to both of these issues. All users of BIND are advised to upgrade to the
errata packages containing BIND 9.2.1 which contains backported patches
that correct these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2002-119.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

1pcs USB 2.0 unique iron man model 8G Enough Memory Stick Flash pen Drive //A2
$0.01
1pcs USB 2.0 unique iron man model 8G Enough Memory Stick Flash pen Drive //A2 pictureHigh Speed Mini USB 2.0 Micro SD TF T-Flash Memory Card Reader Adapter Green
$1.65
High Speed Mini USB 2.0 Micro SD TF T-Flash Memory Card Reader Adapter Green  pictureMicron Flash Memory NAND 2GB SSD Module | MTFDCAE002SAF-1B1 |
$4.99
Micron Flash Memory NAND 2GB SSD Module | MTFDCAE002SAF-1B1 | pictureKOOTION 32GB Wristband USB 2.0 Flash Drive Thumb Drive Memory Stick (32GB Black)
$19.49
KOOTION 32GB Wristband USB 2.0 Flash Drive Thumb Drive Memory Stick (32GB Black) picture


Discussions

No Discussions have been posted on this vulnerability.