summaryrefslogtreecommitdiff
path: root/informationals/teso-i0010.txt
diff options
context:
space:
mode:
Diffstat (limited to 'informationals/teso-i0010.txt')
-rw-r--r--informationals/teso-i0010.txt46
1 files changed, 46 insertions, 0 deletions
diff --git a/informationals/teso-i0010.txt b/informationals/teso-i0010.txt
new file mode 100644
index 0000000..a0703e9
--- /dev/null
+++ b/informationals/teso-i0010.txt
@@ -0,0 +1,46 @@
10010 2000/01/30 Trick for exploiting BIND nameservers
2
3==== TESO Informational =======================================================
4This piece of information is to be kept confidential.
5===============================================================================
6
7Description ..........: Trick for exploiting BIND nameservers
8Date .................: 2000/01/30 12:00
9Author ...............: scut
10Publicity level ......: unknown
11Affected .............: networks with multiple BIND nameservers
12Type of entity .......: misconfiguration
13Type of discovery ....: useful information
14Severity/Importance ..: low
15Found by .............: scut, inspired by smilers ideas and his NXT exploit
16
17Information ===================================================================
18
19When exploiting BIND bugs it is often necessary to make the remote nameserver
20issue a query to your nameserver, which is in some cases a pseudo server which
21sends an exploiting packet back on query.
22
23However in some cases DNS queries aren't allowed to the remote server, although
24you know the server is vulnerable you cannot exploit this weakness, because
25you cannot make it to query your exploiting server.
26
27The DNS server may accept queries only from a predefined IP range, for example
28the IP range of that subnetwork. Often other DNS servers can be found in the
29subnetwork. At the same time it is often the case that these servers are
30configured to just relay the queries to another DNS server. By using a "deaf"
31pseudo-nameserver, which just responds to the IP of the nameserver you want
32to exploit (smilers NXT exploit does support this) you can now exploit that
33server by querying the other nameserver, which accepts your queries, which
34then happily relays the question to the main nameserver.
35
36This nameserver may not carry out the query directly if you'd answer the query
37if it is issued by another nameserver (see TESO Informational #0006), but if
38you don't answer it this nameserver will after a few seconds issue that query
39itself, allowing you to exploit it.
40
41Also using nameserver path discovery (also in #0006) you may be able to spoof
42send the reply in between two nameservers, which is not possible in the NXT case
43but maybe required for future exploits.
44
45===============================================================================
46