ISC Bind 8 Transaction Signatures Buffer Overflow Vulnerability

BIND is a server program that implements the domain name service protocol. It is in extremely wide use on the Internet, in use by most of the DNS servers. Version 8 of BIND contains a overflow that may be exploitable to remote attackers. Due to a bug that is present when handling invalid transaction signatures, it is possible to overwrite some memory locations with a known value. If the request came in via the UDP transport then the area partially overwriten is a stack frame in named. If the request came in via the TCP transport then the area partically overwriten is in the heap and overwrites malloc's internal variables. This can be exploited to execute shellcode with the privileges of named (typically root).


Privacy Statement
Copyright 2010, SecurityFocus