Secure Computing Corporation Information for VU#738331
Domain Name System (DNS) resolver libraries vulnerable to read buffer overflow
- Vendor Information Help Date Notified:
- Statement Date:
- Date Updated: 16 Oct 2002
SIDEWINDER(tm) FIREWALL & VPN (all releases including SIDEWINDER APPLIANCE)
As part of Sidewinder(tm)'s defense in depth architecture, DNS queries are sandboxed by SecureOS(tm)'s patented Type Enforcement technology. Faults in the resolver library cannot cause a comprimise of the Sidewinder(tm). However, since a Bind 8 caching server can still pass this attack along to vulnerable resolvers, Sidewinder(tm) users who wish to protect vulnerable resolvers behind their firewall from attack should upgrade to version 5.2.1.05, which replaces Bind 8 with Bind 9.
Customers should contact Customer Service to obtain version 5.2.1.05.
Gauntlet and e-ppliance
Both Gauntlet Software and Gauntlet e-ppliance utilize the Bind version that ships with Solaris 8. Please see Solaris 8 response to this vulnerability to assess applicability of any potential DOS risk. Secure Computing will test and make recommendations to customers regarding any potential software changes, if any, published by Sun Microsystems.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.