Vulnerability Note VU#16532
BIND T_NXT record processing may cause buffer overflow
A vulnerability in BIND, repaired in verison 8.2.2p5, allows remote attackers to execute code with the privileges of the process running named. This vulnerability was widely exploited from November 1999 to December 2000.
There is a buffer overflow in the processing of NXT records in the routine rrextract, part of the file ns_resp.c. Specifically, in vulnerable versions of BIND, there is a section of code which reads:
An exploit for this vulnerability is publicly available .
Remote user may gain default process access of local nameserver, usually root
Upgrade to the latest version of BIND.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|The SCO Group (SCO Unix)||Affected||-||28 Jan 2001|
|Fujitsu||Not Affected||-||28 Jan 2001|
|Sun Microsystems, Inc.||Not Affected||-||28 Jan 2001|
|Compaq Computer Corporation||Unknown||-||28 Jan 2001|
|Data General||Unknown||-||28 Jan 2001|
CVSS Metrics (Learn More)
Our thanks to ISC for assistance in understanding this vulnerability.
This document was written by Shawn V Hernan.
- CVE IDs: CVE-1999-0833
- CERT Advisory: CA-1999-14
- Date Public: 10 Nov 99
- Date First Published: 28 Jan 2001
- Date Last Updated: 03 Feb 2006
- Severity Metric: 108.16
- Document Revision: 7
If you have feedback, comments, or additional information about this vulnerability, please send us email.