ISC Information for VU#572183
ISC BIND 4 contains buffer overflow in nslookupComplain()
- Vendor Information Help Date Notified: 02 Jan 2001
- Statement Date:
- Date Updated: 04 Apr 2001
Name: "complain bug"
Versions: 4.9.3, 4.9.4, 4.9.5, 4.9.5-P1, 4.9.6, 4.9.7, possibly earlier
version of BIND 4.9.x and BIND 4.9.
Type: Stack corruption, possible remote access.
It is possible to overflow the buffer used by sprintf in
Exploits for this bug exist.
Upgrade to BIND 9, BIND 8 or BIND 4.9.8, in preferred
solution order. BIND 4.9.x should be considered to be dead
code. Only security fixes will be applied BIND 4.9.x.
Discovery and initial documentation of this vulnerability
was conducted by Anthony Osborne and John McDonald of the
COVERT Labs at PGP Security.
The vendor has not provided us with any further information regarding this vulnerability.
The ISC has posted this information on their web site at:
The source code for ISC BIND can be downloaded from: