Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

DNS:QUERY:VERSION-QUERY

Severity

Minor

Recommended

No

Category

DNS

Keywords

dns bind info leak version query

Release Date

2004/01/29

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

DNS: BIND Version Query


This protocol anomaly is a DNS query for version.bind with the type set to TXT and the class set to CHAOS. BIND servers support the ability to be remotely queried for their versions. This can indicate a reconnaisance attempt; when attackers know the BIND version, they can then attempt to exploit vulnerabilities on the server.

Extended Description

A buffer overflow exists in certain versions of BIND, the nameserver daemon currently maintained by the Internet Software Consortium (ISC). BIND fails to properly bound the data recieved when processing an inverse query. Upon a memory copy, portions of the program can be overwritten, and arbitrary commands run on the affected host. Exploits for this vulnerability are very widespread, and were posted to the Bugtraq mailing list.

Affected Products

  • Bsd bsd/os 2.0.0
  • Bsd bsd/os 2.0.1
  • Bsd bsd/os 2.1.0
  • Caldera openlinux_standard 1.0.0
  • Data_general dg/ux_5.4 3.0.0
  • Data_general dg/ux_5.4 3.1.0
  • Data_general dg/ux_5.4 4.1.0
  • Data_general dg/ux_5.4 4.11.0
  • Ibm aix 4.1.0
  • Ibm aix 4.1.1
  • Ibm aix 4.1.2
  • Ibm aix 4.1.3
  • Ibm aix 4.1.4
  • Ibm aix 4.1.5
  • Ibm aix 4.2.0
  • Ibm aix 4.2.1
  • Ibm aix 4.3.0
  • Isc bind 4.9.6
  • Isc bind 8.1.0
  • Isc bind 8.1.1
  • Nec ux/4800 (64)
  • Netbsd netbsd 1.0.0
  • Netbsd netbsd 1.1.0
  • Netbsd netbsd 1.2.0
  • Netbsd netbsd 1.2.1
  • Netbsd netbsd 1.3.0
  • Netbsd netbsd 1.3.1
  • Red_hat linux 4.0.0
  • Red_hat linux 4.1.0
  • Red_hat linux 4.2.0
  • Red_hat linux 5.0.0
  • Sco open_desktop 3.0.0
  • Sco open_server 5.0.0
  • Sco unixware 2.1.0
  • Sco unixware 7.0.0
  • Sgi irix 3.2.0
  • Sgi irix 3.3.0
  • Sgi irix 3.3.1
  • Sgi irix 3.3.2
  • Sgi irix 3.3.3
  • Sgi irix 4.0.0
  • Sgi irix 4.0.1
  • Sgi irix 4.0.1 T
  • Sgi irix 4.0.2
  • Sgi irix 4.0.3
  • Sgi irix 4.0.4
  • Sgi irix 4.0.4 B
  • Sgi irix 4.0.4 T
  • Sgi irix 4.0.5
  • Sgi irix 4.0.5 A
  • Sgi irix 4.0.5 D
  • Sgi irix 4.0.5 E
  • Sgi irix 4.0.5 F
  • Sgi irix 4.0.5 G
  • Sgi irix 4.0.5 H
  • Sgi irix 4.0.5 (IOP)
  • Sgi irix 4.0.5 IPR
  • Sgi irix 5.0.0
  • Sgi irix 5.0.1
  • Sgi irix 5.1.0
  • Sgi irix 5.1.1
  • Sgi irix 5.2.0
  • Sgi irix 5.3.0
  • Sgi irix 5.3.0 XFS
  • Sgi irix 6.0.0
  • Sgi irix 6.0.1
  • Sgi irix 6.0.1 XFS
  • Sgi irix 6.1.0
  • Sgi irix 6.2.0
  • Sgi irix 6.3.0
  • Sun solaris 2.3
  • Sun solaris 2.4
  • Sun solaris 2.5
  • Sun solaris 2.5.1
  • Sun solaris 2.5.1_ppc
  • Sun solaris 2.5.1_x86
  • Sun solaris 2.5_x86
  • Sun solaris 2.6
  • Sun solaris 2.6_x86

References

  • BugTraq: 134
  • CVE: CVE-1999-0009
  • URL: http://www.juniper.net/security/auto/vulnerabilities/vuln2057.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out