Security Portal

Intrusion Prevention Service

 
Signature Version: 4.956

 



DNS BIND Multiple Vulnerabilities
 
Threat Level: Critical
Release Date: 2006/11/8
 
Category: Buffer Overflow
Signature ID: 1048756
Included In:
Affected OS: Linux, FreeBSD, Solaris, Other Unix
 
Description: Improper validation of DNS NXT records may allow an attacker to perform a buffer overflow. This can allow execution of arbitrary code with the privileges of the user running BIND.
 
Impact: The DNS server can be compromised allowing the attacker access with the privileges of the user running BIND. This attack is sometimes referred to as ADMROCKS.
Recommendation: Please off-line the victim host and patch the system or software which exists vulnerabilities immediately.
 
False Positive: None
False Negative: None
 
Additional Information (Links open in new window):
N/A
Reference(s): CA-1998-05; CVE-1998-unknown
 

Search the Threat Database
Enter Rule ID or Name