Security Portal

Intrusion Prevention Service

Signature Version: 4.1046


DNS BIND Multiple Vulnerabilities
Threat Level: Critical
Release Date: 2006/11/8
Category: Buffer Overflow
Signature ID: 1048756
Included In:
Affected OS: Linux, FreeBSD, Solaris, Other Unix
Description: Improper validation of DNS NXT records may allow an attacker to perform a buffer overflow. This can allow execution of arbitrary code with the privileges of the user running BIND.
Impact: The DNS server can be compromised allowing the attacker access with the privileges of the user running BIND. This attack is sometimes referred to as ADMROCKS.
Recommendation: Please off-line the victim host and patch the system or software which exists vulnerabilities immediately.
False Positive: None
False Negative: None
Additional Information (Links open in new window):
Reference(s): CA-1998-05; CVE-1998-unknown

Search the Threat Database
Enter Rule ID or Name