Short Name |
DNS:OVERFLOW:TXTRECORD |
---|---|
Severity |
Critical |
Recommended |
No |
Category |
DNS |
Keywords |
DNS TXT Record Handling Remote Buffer Overflow |
Release Date |
2008/11/20 |
Update Number |
1318 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in SPF Library Project libspf2. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the Root system level. This signature should only be used to protect DNS servers under your control, and not for the Internet in general. This detects DNS TXT records 200 bytes or longer, which is common on the Internet. This library was used primarily in Debian 4.0 and was fixed in libspf2 version 1.2.8, released in mid-September, 2008. If you do not have a vulnerable version of libspf2, it is not recommended to use this signature, as it can false-positive on normal, non-malicious Internet traffic.
The 'libspf2' library is prone to a remote buffer-overflow vulnerability that stems from a lack of bounds checking when handling specially crafted DNS TXT records. Remote attackers may exploit this issue to execute arbitrary code in the context of an application using a vulnerable version of the library. Versions prior to 'libspf2' 1.2.8 are affected.