File: 258.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (67 lines) | stat: -rw-r--r-- 1,604 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
Rule:

--
Sid:
258

--
Summary:
This event is generated when an exploit that targets vulnerabilities in 
BIND 8.2 and 8.2.1 ("ADM named exploit 8.2/8.2.1") is executed against a
local DNS server.

--
Impact:
Severe. Remote code execution with the privileges of the BIND DNS daemon
(named). 

--
Detailed Information:
BIND is DNS server software shipped with a number of UNIX and 
Linux-based operating systems. Attackers can exploit multiple 
vulnerabilities in BIND versions between 8.2 and 8.2.1 to obtain remote 
shell access. This enables the attacker to execute arbitrary code from 
the command shell with the security privileges of the BIND DNS daemon 
(named). If named is running as root, the attacker automatically obtains
root privileges to the system.

--
Affected Systems:
Any operating system running BIND implementations below 8.2.2.

--
Attack Scenarios:
An attacker executes an exploit script against a vulnerable server, 
obtaining shell access to the compromised machine. If named is running 
as root, the attacker automatically obtains root privileges on the 
server. Otherwise, the attacker can execute arbitrary code with the 
privileges of named, which can lead to remote root compromise.

--
Ease of Attack:
Simple. An exploit exists.

--
False Positives:
None known

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to BIND 8.2.2 or higher.

--
Contributors:
Original rule writer unknown
Sourcefire Research Team
Judy Novak (judy.novak@sourcefire.com)
Sourcefire Technical Publications Team
Jen Harvey <jennifer.harvey@sourcefire.com>

--
Additional References:

--