安全研究
安全漏洞
ISC BIND否定应答缓冲污染远程拒绝服务攻击漏洞
发布日期:2003-11-26
更新日期:2003-12-03
受影响系统:
ISC BIND 8.4.2不受影响系统:
ISC BIND 8.4.1
ISC BIND 8.4
ISC BIND 8.3.6
ISC BIND 8.3.5
ISC BIND 8.3.4
ISC BIND 8.3.2
ISC BIND 8.3.1
ISC BIND 8.3
ISC BIND 8.2.7
ISC BIND 8.2.6
ISC BIND 8.2.5
ISC BIND 8.2.4
ISC BIND 8.2.3
ISC BIND 8.3.3
- Apple MacOS 10.1.2
- Apple MacOS 10.1.1
- Apple MacOS 10.1
- Apple MacOS 10.0.4
- Apple MacOS 10.0.3
- Apple MacOS 10.0.2
- Apple MacOS 10.0.1
- Apple MacOS 10.0
- Debian Linux 3.0
- FreeBSD 4.7
- Mandrake Linux 7.2
ISC BIND 8.4.3描述:
ISC BIND 8.4.2
ISC BIND 8.3.7
BUGTRAQ ID: 9114
CVE(CAN) ID: CVE-2003-0914
BIND 8是一款DNS协议实现,named(8)守护程序是Internet域名服务器。
BIND 8存在一个编程错误,远程攻击者可以利用这个漏洞对BIND服务进行拒绝服务攻击。
攻击者可以设置恶意DNS消息提送给目标域名服务器,可导致域名服务器为部分域名缓存一个否定的应答。要执行这个攻击,攻击者必须控制域名服务器,并且目标受害者BIND8查询这个域名服务器。攻击者可以设置一个高的TTL值来保持它的否定记录在目标域名服务器上的缓冲足够长,而这个时候依靠DNS的客户端应用程序将不能进行正常DNS响应。
<*来源:ISC Developers
链接:http://archives.neohapsis.com/archives/hp/2003-q4/0059.html
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:19.bind.asc
*>
建议:
厂商补丁:
FreeBSD
-------
FreeBSD已经为此发布了一个安全公告(FreeBSD-SA-03:19)以及相应补丁:
FreeBSD-SA-03:19:bind8 negative cache poison attack
链接:ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:19.bind.asc
补丁下载:
执行以下步骤之一:
1) 将有漏洞的系统升级到4.9-STABLE;或修正日期后的RELENG_5_1,RELENG_4_9,
RELENG_4_8或RELENG_4_7安全版本。
2) 为当前系统打补丁:
a) 从以下位置下载相关补丁,并使用PGP工具验证附带的PGP签名。
[FreeBSD 4.9和-STABLE系统]
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-836.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-836.patch.asc
[FreeBSD 4.8和5.1系统]
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-834.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-834.patch.asc
[FreeBSD 4.4,4.5,4.6,4.7和5.0系统]
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-833.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-833.patch.asc
b) 以root执行以下命令:
# cd /usr/src
# patch < /path/to/patch
# cd /usr/src/lib/libbind
# make obj && make depend && make
# cd /usr/src/lib/libisc
# make obj && make depend && make
# cd /usr/src/usr.sbin/named
# make obj && make depend && make && make install
# cd /usr/src/libexec/named-xfer
# make obj && make depend && make && make install
在对系统升级或打补丁后,必须重启域名服务。以root执行以下命令:
# ndc restart
VI. 更新细节
下面列出了已修正的FreeBSD版本中每个被修改文件的更新号。
路径 更新
版本
- -------------------------------------------------------------------------
RELENG_4
src/contrib/bind/CHANGES 1.1.1.7.2.11
src/contrib/bind/README 1.1.1.7.2.9
src/contrib/bind/Version 1.1.1.3.2.10
src/contrib/bind/bin/named-xfer/named-xfer.c 1.3.2.8
src/contrib/bind/bin/named/Makefile 1.3.2.6
src/contrib/bind/bin/named/ns_init.c 1.1.1.2.2.6
src/contrib/bind/bin/named/ns_resp.c 1.1.1.2.2.11
src/contrib/bind/bin/nslookup/commands.l 1.4.2.5
src/contrib/bind/bin/nslookup/debug.c 1.3.2.6
src/contrib/bind/bin/nslookup/getinfo.c 1.3.2.9
src/contrib/bind/bin/nslookup/main.c 1.3.2.7
src/contrib/bind/doc/man/dig.1 1.3.2.4
src/contrib/bind/doc/man/host.1 1.3.2.5
src/contrib/bind/doc/man/nslookup.8 1.2.2.5
src/contrib/bind/port/freebsd/include/port_after.h 1.6.2.9
src/contrib/bind/port/freebsd/include/port_before.h 1.1.1.2.2.6
RELENG_5_1
src/UPDATING 1.251.2.13
src/sys/conf/newvers.sh 1.50.2.13
src/contrib/bind/Version 1.1.1.11.2.1
src/contrib/bind/bin/named/ns_resp.c 1.1.1.11.2.1
RELENG_5_0
src/UPDATING 1.229.2.25
src/sys/conf/newvers.sh 1.48.2.20
src/contrib/bind/Version 1.1.1.10.2.1
src/contrib/bind/bin/named/ns_resp.c 1.1.1.10.2.1
RELENG_4_9
src/UPDATING
HP
--
HP已经为此发布了一个安全公告(HPSBUX0311-303)以及相应补丁:
HPSBUX0311-303:SSRT3653 Bind 8.1.2
链接:http://archives.neohapsis.com/archives/hp/2003-q4/0059.html
补丁下载:
HP HP-UX 11.0:
HP Patch BIND812v005.depot
bind1@hprc.external.hp.com/" target="_blank">ftp://bind:bind1@hprc.external.hp.com/
HP HP-UX 11.11:
HP Patch SSRT3653UX.depot
bind1@hprc.external.hp.com/" target="_blank">ftp://bind:bind1@hprc.external.hp.com/
ISC
---
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
ISC Upgrade bind-src.tar.gz
ftp://ftp.isc.org/isc/bind/src/8.3.7/bind-src.tar.gz
BIND 8.3.7
ISC Upgrade bind-doc.tar.gz
ftp://ftp.isc.org/isc/bind/src/8.3.7/bind-doc.tar.gz
BIND 8.3.7
ISC Upgrade bind-contrib.tar.gz
ftp://ftp.isc.org/isc/bind/src/8.3.7/bind-contrib.tar.gz
BIND 8.3.7
ISC APAR BIND 8.4.3 source package
ftp://ftp.isc.org/isc/bind/src/8.4.3/bind-src.tar.gz
ISC Upgrade BIND 8.4.3 documentation
ftp://ftp.isc.org/isc/bind/src/8.4.3/bind-doc.tar.gz
ISC Upgrade BIND 8.4.3 contrib packages
ftp://ftp.isc.org/isc/bind/src/8.4.3/bind-contrib.tar.gz
ISC Upgrade BIND 8.4.3 Windows NT / Windows 2000 Binaries
ftp://ftp.isc.org/isc/bind/contrib/ntbind-8.4.3/BIND8.4.3.zip
ISC Upgrade BIND 8.4.3 Tools Windows NT / Windows 2000 Binaries
ftp://ftp.isc.org/isc/bind/contrib/ntbind-8.4.3/BIND8.4.3Tools.zip
S.u.S.E.
--------
S.u.S.E.已经为此发布了一个安全公告(SuSE-SA:2003:047)以及相应补丁:
SuSE-SA:2003:047:bind8
补丁下载:
S.u.S.E. RPM bind8-8.2.4-128.sparc.rpm
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n2/bind8-8.2.4-128.sparc.rpm
S.u.S.E. Upgrade bind8-8.2.4-336.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/bind8-8.2.4-336.i586.rpm
S.u.S.E. Upgrade bind8-8.2.4-336.i586.patch.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/bind8-8.2.4-336.i586.patch.rpm
S.u.S.E. Upgrade bind8-8.2.4-334.i386.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n2/bind8-8.2.4-334.i386.rpm
S.u.S.E. Upgrade bind8-8.2.4-334.i386.patch.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n2/bind8-8.2.4-334.i386.patch.rpm
S.u.S.E. Upgrade bind8-8.2.4-334.i386.rpm
ftp://ftp.suse.com/pub/suse/i386/update/7.3/n2/bind8-8.2.4-334.i386.rpm
S.u.S.E. Upgrade bind8-8.2.4-243.ppc.rpm
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/n2/bind8-8.2.4-243.ppc.rpm
S.u.S.E. Upgrade bind8-8.3.4-64.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/bind8-8.3.4-64.i586.rpm
S.u.S.E. Upgrade bind8-8.3.4-64.i586.patch.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/bind8-8.3.4-64.i586.patch.rpm
浏览次数:3683
严重程度:0(网友投票)
绿盟科技给您安全的保障