|
Full Disclosure
mailing list archives
[ GLSA 201111-06 ] MaraDNS: Arbitrary code execution
From: Alex Legler <a3li () gentoo org>
Date: Sun, 20 Nov 2011 19:12:54 +0100
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201111-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: MaraDNS: Arbitrary code execution
Date: November 20, 2011
Bugs: #352569
ID: 201111-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A buffer overflow vulnerability in MaraDNS allows remote attackers to
execute arbitrary code or cause a Denial of Service.
Background
==========
MaraDNS is a proxy DNS server with permanent caching.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-dns/maradns < 1.4.06 >= 1.4.06
Description
===========
A long DNS hostname with a large number of labels could trigger a
buffer overflow in the compress_add_dlabel_points() function of
dns/Compress.c.
Impact
======
A remote unauthenticated attacker could execute arbitrary code or cause
a Denial of Service.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All MaraDNS users should upgrade to the latest stable version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/maradns-1.4.06"
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since February 12, 2011. It is likely that your system is
already no longer affected by this issue.
References
==========
[ 1 ] CVE-2011-0520
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0520
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201111-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security () gentoo org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2011 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Attachment:
signature.asc
Description: This is a digitally signed message part.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
- [ GLSA 201111-06 ] MaraDNS: Arbitrary code execution Alex Legler (Nov 20)
|