|
Family: SuSE Local Security Checks --> Category: infos
SUSE-SA:2002:044: bind8 Vulnerability Scan
Vulnerability Scan Summary Check for the version of the bind8 package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory SUSE-SA:2002:044 (bind8).
The security research company ISS (Internet Security Services)
has discovered several vulnerabilities in the BIND8 name server,
including a remotely exploitable buffer overflow.
1. There is a buffer overflow in the way named handles
SIG records. This buffer overflow can be exploited to
obtain access to the victim host under the account
the named process is running with.
2. There are several Denial Of Service problems in BIND8
that allow remote attackers to terminate the name server
process.
Both vulnerabilities are addressed by this update, using patches
originating from ISC.
Solution : http://www.suse.de/security/2002_004_bind8.html
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|