Although it doesn't apply to this worm really, even if BIND is not run as root, it usually starts that way, so if you could exploit this hole, you could plant a "bomb" that would effectively root the box the next time BIND was run as root (such as a restart), which could then be provoked with any number of DoS attacks...
But not running BIND as root is certainly the first step. What we need is a clean-slate, audited-code DNS implementation that is configuration-file compatible with BIND -- That would certainly make migration easier for the rest of the world, and maybe we'd get away from these BIND-related nasties for good.
Signature void where prohibited by law.
-
Are you posting in the right place? Check out Where do I post X? to know for sure.
-
Posts may use any of the Perl Monks Approved HTML tags. Currently these include the following:
<code> <a> <b> <big>
<blockquote> <br /> <dd>
<dl> <dt> <em> <font>
<h1> <h2> <h3> <h4>
<h5> <h6> <hr /> <i>
<li> <nbsp> <ol> <p>
<small> <strike> <strong>
<sub> <sup> <table>
<td> <th> <tr> <tt>
<u> <ul>
-
Snippets of code should be wrapped in
<code> tags not
<pre> tags. In fact, <pre>
tags should generally be avoided. If they must
be used, extreme care should be
taken to ensure that their contents do not
have long lines (<70 chars), in order to prevent
horizontal scrolling (and possible janitor
intervention).
-
Want more info? How to link
or How to display code and escape characters
are good places to start.
|