安全研究

安全漏洞
ISC BIND否定应答缓冲污染远程拒绝服务攻击漏洞

发布日期:2003-11-26
更新日期:2003-12-03

受影响系统:
ISC BIND 8.4.2
ISC BIND 8.4.1
ISC BIND 8.4
ISC BIND 8.3.6
ISC BIND 8.3.5
ISC BIND 8.3.4
ISC BIND 8.3.2
ISC BIND 8.3.1
ISC BIND 8.3
ISC BIND 8.2.7
ISC BIND 8.2.6
ISC BIND 8.2.5
ISC BIND 8.2.4
ISC BIND 8.2.3
ISC BIND 8.3.3
    - Apple MacOS 10.1.2
    - Apple MacOS 10.1.1
    - Apple MacOS 10.1
    - Apple MacOS 10.0.4
    - Apple MacOS 10.0.3
    - Apple MacOS 10.0.2
    - Apple MacOS 10.0.1
    - Apple MacOS 10.0
    - Debian Linux 3.0
    - FreeBSD 4.7
    - Mandrake Linux 7.2
不受影响系统:
ISC BIND 8.4.3
ISC BIND 8.4.2
ISC BIND 8.3.7
描述:
BUGTRAQ  ID: 9114
CVE(CAN) ID: CVE-2003-0914

BIND 8是一款DNS协议实现,named(8)守护程序是Internet域名服务器。

BIND 8存在一个编程错误,远程攻击者可以利用这个漏洞对BIND服务进行拒绝服务攻击。

攻击者可以设置恶意DNS消息提送给目标域名服务器,可导致域名服务器为部分域名缓存一个否定的应答。要执行这个攻击,攻击者必须控制域名服务器,并且目标受害者BIND8查询这个域名服务器。攻击者可以设置一个高的TTL值来保持它的否定记录在目标域名服务器上的缓冲足够长,而这个时候依靠DNS的客户端应用程序将不能进行正常DNS响应。

<*来源:ISC Developers
  
  链接:http://archives.neohapsis.com/archives/hp/2003-q4/0059.html
        ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:19.bind.asc
        *>

建议:
厂商补丁:

FreeBSD
-------
FreeBSD已经为此发布了一个安全公告(FreeBSD-SA-03:19)以及相应补丁:
FreeBSD-SA-03:19:bind8 negative cache poison attack
链接:ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:19.bind.asc

补丁下载:

执行以下步骤之一:

1) 将有漏洞的系统升级到4.9-STABLE;或修正日期后的RELENG_5_1,RELENG_4_9,
RELENG_4_8或RELENG_4_7安全版本。

2) 为当前系统打补丁:

a) 从以下位置下载相关补丁,并使用PGP工具验证附带的PGP签名。

[FreeBSD 4.9和-STABLE系统]
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-836.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-836.patch.asc

[FreeBSD 4.8和5.1系统]
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-834.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-834.patch.asc

[FreeBSD 4.4,4.5,4.6,4.7和5.0系统]
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-833.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-833.patch.asc

b) 以root执行以下命令:

# cd /usr/src
# patch < /path/to/patch
# cd /usr/src/lib/libbind
# make obj && make depend && make
# cd /usr/src/lib/libisc
# make obj && make depend && make
# cd /usr/src/usr.sbin/named
# make obj && make depend && make && make install
# cd /usr/src/libexec/named-xfer
# make obj && make depend && make && make install

在对系统升级或打补丁后,必须重启域名服务。以root执行以下命令:

# ndc restart

VI. 更新细节

下面列出了已修正的FreeBSD版本中每个被修改文件的更新号。

路径                                                             更新
  版本
- -------------------------------------------------------------------------
RELENG_4
  src/contrib/bind/CHANGES                                   1.1.1.7.2.11
  src/contrib/bind/README                                     1.1.1.7.2.9
  src/contrib/bind/Version                                   1.1.1.3.2.10
  src/contrib/bind/bin/named-xfer/named-xfer.c                    1.3.2.8
  src/contrib/bind/bin/named/Makefile                             1.3.2.6
  src/contrib/bind/bin/named/ns_init.c                        1.1.1.2.2.6
  src/contrib/bind/bin/named/ns_resp.c                       1.1.1.2.2.11
  src/contrib/bind/bin/nslookup/commands.l                        1.4.2.5
  src/contrib/bind/bin/nslookup/debug.c                           1.3.2.6
  src/contrib/bind/bin/nslookup/getinfo.c                         1.3.2.9
  src/contrib/bind/bin/nslookup/main.c                            1.3.2.7
  src/contrib/bind/doc/man/dig.1                                  1.3.2.4
  src/contrib/bind/doc/man/host.1                                 1.3.2.5
  src/contrib/bind/doc/man/nslookup.8                             1.2.2.5
  src/contrib/bind/port/freebsd/include/port_after.h              1.6.2.9
  src/contrib/bind/port/freebsd/include/port_before.h         1.1.1.2.2.6
RELENG_5_1
  src/UPDATING                                                 1.251.2.13
  src/sys/conf/newvers.sh                                       1.50.2.13
  src/contrib/bind/Version                                   1.1.1.11.2.1
  src/contrib/bind/bin/named/ns_resp.c                       1.1.1.11.2.1
RELENG_5_0
  src/UPDATING                                                 1.229.2.25
  src/sys/conf/newvers.sh                                       1.48.2.20
  src/contrib/bind/Version                                   1.1.1.10.2.1
  src/contrib/bind/bin/named/ns_resp.c                       1.1.1.10.2.1
RELENG_4_9
  src/UPDATING

HP
--
HP已经为此发布了一个安全公告(HPSBUX0311-303)以及相应补丁:
HPSBUX0311-303:SSRT3653 Bind 8.1.2
链接:http://archives.neohapsis.com/archives/hp/2003-q4/0059.html

补丁下载:

HP HP-UX 11.0:

HP Patch BIND812v005.depot
bind1@hprc.external.hp.com/" target="_blank">ftp://bind:bind1@hprc.external.hp.com/

HP HP-UX 11.11:

HP Patch SSRT3653UX.depot
bind1@hprc.external.hp.com/" target="_blank">ftp://bind:bind1@hprc.external.hp.com/

ISC
---
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

ISC Upgrade bind-src.tar.gz
ftp://ftp.isc.org/isc/bind/src/8.3.7/bind-src.tar.gz
BIND 8.3.7

ISC Upgrade bind-doc.tar.gz
ftp://ftp.isc.org/isc/bind/src/8.3.7/bind-doc.tar.gz
BIND 8.3.7

ISC Upgrade bind-contrib.tar.gz
ftp://ftp.isc.org/isc/bind/src/8.3.7/bind-contrib.tar.gz
BIND 8.3.7

ISC APAR BIND 8.4.3 source package
ftp://ftp.isc.org/isc/bind/src/8.4.3/bind-src.tar.gz

ISC Upgrade BIND 8.4.3 documentation
ftp://ftp.isc.org/isc/bind/src/8.4.3/bind-doc.tar.gz

ISC Upgrade BIND 8.4.3 contrib packages
ftp://ftp.isc.org/isc/bind/src/8.4.3/bind-contrib.tar.gz

ISC Upgrade BIND 8.4.3 Windows NT / Windows 2000 Binaries
ftp://ftp.isc.org/isc/bind/contrib/ntbind-8.4.3/BIND8.4.3.zip

ISC Upgrade BIND 8.4.3 Tools Windows NT / Windows 2000 Binaries
ftp://ftp.isc.org/isc/bind/contrib/ntbind-8.4.3/BIND8.4.3Tools.zip

S.u.S.E.
--------
S.u.S.E.已经为此发布了一个安全公告(SuSE-SA:2003:047)以及相应补丁:
SuSE-SA:2003:047:bind8

补丁下载:

S.u.S.E. RPM bind8-8.2.4-128.sparc.rpm
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n2/bind8-8.2.4-128.sparc.rpm

S.u.S.E. Upgrade bind8-8.2.4-336.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/bind8-8.2.4-336.i586.rpm

S.u.S.E. Upgrade bind8-8.2.4-336.i586.patch.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/bind8-8.2.4-336.i586.patch.rpm

S.u.S.E. Upgrade bind8-8.2.4-334.i386.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n2/bind8-8.2.4-334.i386.rpm

S.u.S.E. Upgrade bind8-8.2.4-334.i386.patch.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n2/bind8-8.2.4-334.i386.patch.rpm

S.u.S.E. Upgrade bind8-8.2.4-334.i386.rpm
ftp://ftp.suse.com/pub/suse/i386/update/7.3/n2/bind8-8.2.4-334.i386.rpm

S.u.S.E. Upgrade bind8-8.2.4-243.ppc.rpm
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/n2/bind8-8.2.4-243.ppc.rpm

S.u.S.E. Upgrade bind8-8.3.4-64.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/bind8-8.3.4-64.i586.rpm

S.u.S.E. Upgrade bind8-8.3.4-64.i586.patch.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/bind8-8.3.4-64.i586.patch.rpm

浏览次数:3683
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障