Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

DNS:OVERFLOW:TXTRECORD

Severity

Critical

Recommended

No

Category

DNS

Keywords

DNS TXT Record Handling Remote Buffer Overflow

Release Date

2008/11/20

Update Number

1318

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

DNS: DNS TXT Record Handling Remote Buffer Overflow


This signature detects attempts to exploit a known vulnerability in SPF Library Project libspf2. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the Root system level. This signature should only be used to protect DNS servers under your control, and not for the Internet in general. This detects DNS TXT records 200 bytes or longer, which is common on the Internet. This library was used primarily in Debian 4.0 and was fixed in libspf2 version 1.2.8, released in mid-September, 2008. If you do not have a vulnerable version of libspf2, it is not recommended to use this signature, as it can false-positive on normal, non-malicious Internet traffic.

Extended Description

The 'libspf2' library is prone to a remote buffer-overflow vulnerability that stems from a lack of bounds checking when handling specially crafted DNS TXT records. Remote attackers may exploit this issue to execute arbitrary code in the context of an application using a vulnerable version of the library. Versions prior to 'libspf2' 1.2.8 are affected.

Affected Products

  • Astaro Security Gateway 7
  • Debian Linux 4.0
  • Debian Linux 4.0 Alpha
  • Debian Linux 4.0 Amd64
  • Debian Linux 4.0 Arm
  • Debian Linux 4.0 Hppa
  • Debian Linux 4.0 Ia-32
  • Debian Linux 4.0 Ia-64
  • Debian Linux 4.0 M68k
  • Debian Linux 4.0 Mips
  • Debian Linux 4.0 Mipsel
  • Debian Linux 4.0 Powerpc
  • Debian Linux 4.0 S/390
  • Debian Linux 4.0 Sparc
  • Gentoo Linux
  • libspf2 1.2.1
  • libspf2 1.2.2
  • libspf2 1.2.3
  • libspf2 1.2.4
  • libspf2 1.2.5
  • libspf2 1.2.6
  • libspf2 1.2.7

References

  • BugTraq: 31881
  • CVE: CVE-2012-5671
  • CVE: CVE-2008-2469
  • URL: http://www.doxpara.com/?page_id=1256

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out