[dns-operations] NSD Buffer Overflow
Sidney Faber
sfaber at cert.org
Tue May 19 18:25:33 UTC 2009
http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html
NLnet Labs, NSD development team.
Authored May, 2009
Updated and released May 19, 2009
Summary
On May 6 2009, Ilja van Sprundel of IOActive has reported to NLnet Labs a one-byte buffer overflow in NSD. The problem affects all versions 2.0.0 to 3.2.1. The bug allows a carefully crafted exploit to bring down your DNS server. It is highly unlikely that this one byte overflow can lead to other (system) exploits.
Solution
To resolve the issue, update your systems to NSD version 3.2.2 or higher. If you insist in running an older version of NSD, we have published vulnerability patches for versions 3.2.1 and 2.3.7. The patch makes clear what you should change in the source code, if you run a different or modified version of NSD.
Download NSD 3.2.2 (SHA1 checksum: 23fc0be5d447ea852acd49f64743c96403a091fa )
Vulnerability patch for NSD 3.2.1 (SHA1 checksum: 20cb9fc73fae951a9cc25822c48b17ca1d956119 )
Vulnerability patch for NSD 2.3.7 (SHA1 checksum: 94887d212621b458a86ad5b086eec9240477 )
Acknowledgements
We acknowledge and thank Ilja van Sprundel of IOActive for finding and reporting this vulnerability.
More information about the dns-operations
mailing list