Buffer overflow in the code for recursion and glue fetching in BIND 8.4.4 and 8.4.5 allows remote attackers to cause a denial of service (crash) via queries that trigger the overflow in the q_usedns array that tracks nameservers and addresses.
Link | Tags |
---|---|
http://securitytracker.com/id?1012996 | vdb entry |
http://www.uniras.gov.uk/niscc/docs/al-20050125-00059.html | patch |
http://www.kb.cert.org/vuls/id/327633 | third party advisory us government resource |
http://secunia.com/advisories/14009 | third party advisory |
http://www.securityfocus.com/bid/12364 | vdb entry |
http://www.isc.org/index.pl?/sw/bind/bind8.php | patch |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.1/SCOSA-2006.1.txt | vendor advisory |
http://www.isc.org/index.pl?/sw/bind/bind-security.php | patch |
http://secunia.com/advisories/18291 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19063 | vdb entry |