10
CVSSv2

CVE-2001-0010

Published: 12/02/2001 Updated: 10/09/2008
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote malicious users to gain root privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

isc bind 8.2.2

isc bind 8.2.1

isc bind 8.2

Vendor Advisories

BIND 8 suffered from several buffer overflows It is possible to construct an inverse query that allows the stack to be read remotely exposing environment variables CERT has disclosed information about these issues A new upstream version fixes this Due to the complexity of BIND we have decided to make an exception to our rule by releasing the ne ...

Exploits

/*## copyright LAST STAGE OF DELIRIUM feb 2001 poland *://lsd-plnet/ #*/ /*## bind 82 821 822 822-PX Slackware 40/RedHat 62 #*/ /* The code establishes a TCP connection with port 53 of a target system */ /* It makes use of the "infoleak" bug (through UDP) to obtain the base */ /* value of the named pro ...
/* * This exploit has been fixed and extensive explanation and clarification * added * Cleanup done by: * Ian Goldberg <ian@cypherpunksca> * Jonathan Wilkins <jwilkins@bitlandnet> * NOTE: the default installation of RedHat 62 seems to not be affected * due to the compiler options If BIND is built from source the ...
/* * tsig0wnc * Copyright Field Marshal August Wilhelm Anton Count Neithardt von Gneisenau * gneisenau@berlincom * The author is not and will not be held responsible for the action of * other people using this code * provided for informational purposes only * since a greetz section is de rigeur * greets to my luv scharnie, sheib, darkx, ...
/*## copyright LAST STAGE OF DELIRIUM feb 2001 poland *://lsd-plnet/ #*/ /*## bind 82 821 822 822-PX Solaris 27 x86 #*/ /* The code establishes a TCP connection with port 53 of a target system */ /* It makes use of the "infoleek" bug (through UDP) to obtain the base */ /* value of the named pro ...