Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

SCAN:MISC:ADMROCKS-UDP

Severity

High

Recommended

No

Recommended Action

Drop

Category

SCAN

Keywords

ADMROCKS Buffer Overflow (UDP)

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

DNS: ADMROCKS Buffer Overflow (UDP)


This signature detects attempts to exploit a known vulnerability against NXT Bind. Attackers can create the subdirectory ADMROCKS in the directory where BIND is running on a nameserver. Using the ADM exploit (t666.c), attackers can cause a target nameserver to query UDP/53 on an attacker-controlled nameserver, where malicious data/code (built from t666.c) crafted to look like a NXT response is listening. When the query is made, the code executes and overruns the buffer that stores the NXT resource record response on the target nameserver. Attackers can gain root access.

Extended Description

There are several vulnerabilities in recent BIND packages (pre 8.2.2). The first is a buffer overflow condition which is a result of BIND improperly validating NXT records. The consequence of this being exploited is a remote root compromise (assuming that BIND is running as root, which is default). The second is a denial of service which can occur if BIND does not validate SIG records properly. The next is a bug which allows attackers to cause BIND to consume more file descriptors than can be managed, causing named to crash. The fourth vulnerability is another denial of service which can be caused locally if certain permission conditions are met when validating zone information loaded from disk files. The last is a vulnerability which has to do with closing TCP sockets. If protocols for doing so are not adhered to, BIND can be paused for 120 seconds at a time.

Affected Products

  • ISC BIND 4.9.5
  • ISC BIND 4.9.5 P1
  • ISC BIND 4.9.6
  • ISC BIND 4.9.7
  • ISC BIND 4.9.7 -T1B
  • ISC BIND 8.1.0
  • ISC BIND 8.1.1
  • ISC BIND 8.1.2
  • ISC BIND 8.2.0
  • ISC BIND 8.2.1
  • ISC BIND 8.2.2 P1
  • SGI IRIX 6.5.0
  • SGI IRIX 6.5.1
  • SGI IRIX 6.5.10
  • SGI IRIX 6.5.11
  • SGI IRIX 6.5.12
  • SGI IRIX 6.5.13
  • SGI IRIX 6.5.14
  • SGI IRIX 6.5.15
  • SGI IRIX 6.5.16
  • SGI IRIX 6.5.17
  • SGI IRIX 6.5.2
  • SGI IRIX 6.5.3
  • SGI IRIX 6.5.4
  • SGI IRIX 6.5.5
  • SGI IRIX 6.5.6
  • SGI IRIX 6.5.7
  • SGI IRIX 6.5.8
  • SGI IRIX 6.5.9
  • Sun Solaris 7.0
  • Sun Solaris 7.0_x86

References

  • BugTraq: 788
  • CERT: CA-1999-14
  • CVE: CVE-1999-0833
  • URL: http://www.ciac.org/ciac/bulletins/k-050.shtml
  • URL: http://www.groar.org/expl/beginner/understanding-bof.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out