File: 252.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (71 lines) | stat: -rw-r--r-- 1,283 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
Rule:

--
Sid:
252

--
Summary:
This event is generated when an attempt is made to send an inverse query
to a DNS server. This could indicate a future attack.

--
Impact:
Intelligence gathering. This is just an attempt to see if the DNS server
responds to such a query.

--
Detailed Information:
Certain versions of BIND fail to propery bound data recieved when 
handling an inverse query. Upon being copied to memory, portions of the 
program can be overwritten and arbitrary commands can be run on the 
affected host.

--
Affected Systems:
	BIND pre 8.1.2 / 4.9.8

--
Attack Scenarios:
An attacker can send the reverse query and if the server responds the 
attacker might then proceed to exploit the flaw in Bind.

--
Ease of Attack:
Simple. Exploit code is available.

--
False Positives:
None Known

--
False Negatives:
None Known

--
Corrective Action:
Upgrade BIND.

--
Contributors:
Original Rule Writer Unknown
Sourcefire Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>
Snort documentation contributed by Josh Sakofsky

-- 
Additional References:

RFC:
http://www.rfc-editor.org/rfc/rfc1035.txt

Bugtraq:
http://www.securityfocus.com/bid/134

CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0009

Arachnids:
http://www.whitehats.com/info/IDS277 

--