DNS Vulnerabilities

Updated 6/5/02

Impact

This document will cover several BIND vulnerabilities that malicious users can exploit to both gain unauthorized, privileged access to target machines and/or disrupt service on target machines.

Note: While the stoplight on this page indicates the highest possible severity level (and thus the most dire consequences if this vulnerability is indeed exploited), consult the bullet next to the link to this tutorial to check your actual susceptibility to this vulnerability. If the bullet is green, then we have checked the version of DNS being used and it is protected against this vulnerability (in other words, you need not worry about this particular vulnerability). If it is red, however, then we have detected a version of DNS that is susceptible to a vulnerability which could allow remote access. Please read the rest of this document to learn about possible solutions and/or workarounds. If the bullet is brown, then we were either unable to gather sufficient information to tell whether or not DNS is vulnerable, or we have detected a version of DNS that is susceptible to a denial-of-service vulnerability. In this case, caution should be exercised, and it might be best to continue reading through this document to avoid any problems.

Background

This section is only available with the purchase of SAINTwriter™, SAINTexpressSM, or WebSAINTSM.

The Problems/Resolutions

This section is only available with the purchase of SAINTwriter™, SAINTexpressSM, or WebSAINTSM.

Where can I read more about this?

This section is only available with the purchase of SAINTwriter™, SAINTexpressSM, or WebSAINTSM.