Short Name |
DNS:OVERFLOW:SCO-NAMED2-OF1 |
---|---|
Severity |
Critical |
Recommended |
No |
Recommended Action |
Drop |
Category |
DNS |
Keywords |
SCO Openserver named Buffer Overflow (1) |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
The DNS daemon (named) shipped with several versions of SCO Openserver is vulnerable to a buffer overflow attack. Successful exploitation of this attack will result in the attacker gaining control of the victim with permissions of the user running named. This affects SCO OpenServer 5.0.5 and prior versions using the same named.
Successful exploitation would allow for arbitrary code injection and execution with the root privileges of the server process. Code injection that does not result in execution would crash the application due to memory corruption and would result in the denial of service condition.