Intruders alter a valid DNS server's (we will call this box [SERVER 1]) lookup table to point toward their computer [HACKER.COM] as the Authoritative Name Server for that domain. Intruders then prompt your DNS server to resolve [HACKER.COM]. [SERVER 1] passes the information back to your DNS server for the Authoritative Name Server for . Your DNS server then goes to [HACKER.COM] looking to complete the query. Once your DNS server queries [HACKER.COM] for resolution, BIND runs and the buffer overflow condition occurs.
Once the buffer overflow is executed, the following command is executed in the source code obtained by CIAC: cd /; uname -a; pwd; id;. The named service will crash as a result of the buffer overflow.
The link for this article located at CIAC is no longer available.