

DOVES Vulnerability V-00102
DOVES Project
Computer Security Laboratory
Department of Computer Science
University of California at Davis
Brief summary: BIND Inverse-Query buffer overflow
Detailed description: BIND does not check the bounds of a memory copy when building a response to an inverse query request. By sending an appropriately formatted inverse-query on a TCP stream, an attacker can overwrite the stack and execute commands with the privilege of the BIND daemon, namely root.
Components: bind 8.1.1 and earlier, bind 4.9.6 and earlier
Operating system(s): Caldera OpenLinux; IBM AIX 4.3.x and earlier; NEC UX/4899 R11.x, R13.x; NetBSD 1.3, 1.3.1, -current before 19980408 Red Hat Linux 5.0, 4.2; SCO Open Desktop/Open Server 3.0, SCO UNIX 3.2v4, SGI IRIX 3.X-6.X; OpenServer 5.0 (also SCO Internet FastStart), UnixWare 2.1, UnixWare 7; Solaris 5.3, 5.4, 5.5, 5.5.1, 5.6; Data General earlier than R4.20MU04; not vulnerable: BSD/OS 3.0/3.1 as shipped, and later; Data General R4.20MU04 and later; FreeBSD 2.2.0 and later; SCO CMW+ 3.0> The attacker can execute code with the privileges of the BIND daemon
How to detect:
fake-iquery yes;is there, you are vulnerable.
fake-iquery yes;is there, you are vulnerable.
#defining INVQis there, you are vulnerable.
How to fix:
fake-iquery yes;
#defining INVQ
Other information:
PA Classification:
RISOS Classification:
Davis Classification:
Common Vulnerability Exposure: Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases [CVE-1999-0009]
Attacks: See Doves exploit #102 and Doves exploit #103.
Advisories:
Related DOVES entries:
Who reported it: CERT in CERT Advisory CA-98.05, Multiple Vulnerabilities in BIND: 1. Inverse Query Buffer Overrun in BIND 4.9 and BIND 8 Releases on Apr. 8, 1998; gut@SHELL.CDC.NET in Bugtraq on May 31, 1998: the exploit
Send email to doves@cs.ucdavis.edu
Department of Computer Science
University of California at Davis
One Shields Ave.
Davis, CA 95616-8562
Dove images © 1999-2000 www.barrysclipart.com