Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

DNS:OVERFLOW:SCO-NAMED2-OF1

Severity

Critical

Recommended

No

Recommended Action

Drop

Category

DNS

Keywords

sco named dns overflow

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

DNS: SCO Openserver named Buffer Overflow (1)


The DNS daemon (named) shipped with several versions of SCO Openserver is vulnerable to a buffer overflow attack. Successful exploitation of this attack will result in the attacker gaining control of the victim with permissions of the user running named. This affects SCO OpenServer 5.0.5 and prior versions using the same named.

Extended Description

Successful exploitation would allow for arbitrary code injection and execution with the root privileges of the server process. Code injection that does not result in execution would crash the application due to memory corruption and would result in the denial of service condition.

References

  • CVE: CVE-2001-0588
  • URL: ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.38/CSSA-2001-SCO.38.txt
  • URL: ftp://stage.caldera.com/pub/security/unixware/CSSA-2001-SCO.1/CSSA-2001-SCO.1.txt

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out