首页 -> 安全研究

安全研究

绿盟月刊
绿盟安全月刊->第32期->最新漏洞
期刊号: 类型: 关键词:
ISC BIND 9存在拒绝服务漏洞

日期:2002-06-19

发布日期: 2002-6-4
更新日期: 2002-6-6
受影响的系统:  
ISC BIND 9.2
ISC BIND 9.1.3
ISC BIND 9.1.2
ISC BIND 9.1.1
ISC BIND 9.1
ISC BIND 9.0
    - Linux系统  
    - Unix系统  

不受影响系统:  
ISC BIND 9.2.1

描述:
--------------------------------------------------------------------------------


BUGTRAQ  ID: 4936
CVE(CAN) ID: CAN-2002-0400

BIND是一款由ISC维护的Internet域名名字系统实现。

BIND 9在处理特殊DNS包时存在漏洞,可导致远程攻击者关闭BIND服务程序。

攻击者可以发送设计用于触发一内部一致性检查的DNS包而导致BIND服务程序崩溃,由于此崩溃是由于程序探测到错误条件而不是处理错误而触发,所以不允许攻击者执行任意命令或者写数据到任意内存位置。

当传递给message.c中的dns_message_findtype()函数的rdataset参数不是所预期的NULL时,内部一致性检查就会触发。此条件导致代码声称接收到错误消息并调用abort()关闭BIND服务程序。

此意外错误可以通过使用普通的查询操作时发生,特别是来自SMTP服务器的查询很有可能触发此问题。

<*来源:Internet Software Consortium
  
  链接:http://www.cert.org/advisories/CA-2002-15.html
        https://www.redhat.com/support/errata/RHSA-2002-105.html
        http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000494
        http://www.suse.com/de/support/security/2002_21_bind9.html
*>


--------------------------------------------------------------------------------
建议:

临时解决方法:

本漏洞没有有效的临时解决方法,您应该尽快从ISC站点或者操作系统厂商那里获取并升级到(目前)最新的bind 9.2.1。

厂商补丁:

Conectiva
---------
Conectiva已经为此发布了一个安全公告(CLA-2002:494)以及相应补丁:
CLA-2002:494:bind  Denial of Service vulnerability
链接:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000494

补丁下载:

ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/bind-9.2.1-1U70_2cl.src.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/bind-9.2.1-1U70_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/bind-chroot-9.2.1-1U70_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/bind-devel-9.2.1-1U70_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/bind-devel-static-9.2.1-1U70_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/bind-doc-9.2.1-1U70_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/bind-utils-9.2.1-1U70_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/bind-9.2.1-1U8_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/bind-9.2.1-1U8_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/bind-chroot-9.2.1-1U8_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/bind-devel-9.2.1-1U8_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/bind-devel-static-9.2.1-1U8_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/bind-doc-9.2.1-1U8_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/bind-libs-9.2.1-1U8_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/bind-utils-9.2.1-1U8_1cl.i386.rpm

Conectiva Linux version 6.0及以上版本的用户可以使用apt进行RPM包的更新:

- 把以下的文本行加入到/etc/apt/sources.list文件中:
  
rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates

(如果你不是使用6.0版本,用合适的版本号代替上面的6.0)

- 执行:                 apt-get update
- 更新以后,再执行:     apt-get upgrade

ISC
---
ISC已经发布BIND 9.2.1版本,可以从如下地址下载:

http://www.isc.org/products/BIND/bind9.html

相关系统受影响情况:

供应商               状态                修正日期

3Com                 未知               30-May-2002
Alcatel              未知               30-May-2002
Apple              不受影响             31-May-2002
AT&T                 未知               30-May-2002
BSDI               不受影响             4-Jun-2002
Caldera             受影响              31-May-2002
Cisco                未知               30-May-2002
Compaq Computer    不受影响             4-Jun-2002
Cray               不受影响             30-May-2002
Data General         未知               30-May-2002
Debian               未知               30-May-2002
djbdns               未知               4-Jun-2002
Engarde            不受影响             30-May-2002
F5 Networks        不受影响             30-May-2002
FreeBSD            不受影响             30-May-2002
Fujitsu              未知               30-May-2002
Hewlett Packard     受影响              4-Jun-2002
IBM                不受影响             4-Jun-2002
IBM-zSeries          未知               30-May-2002
Intel                未知               30-May-2002
ISC                  受影响             30-May-2002
Juniper Networks     未知               30-May-2002
Lucent               未知               30-May-2002
MandrakeSoft        受影响              3-Jun-2002
Microsoft          不受影响             30-May-2002
NEC Corporation    不受影响             3-Jun-2002
NetBSD              受影响              4-Jun-2002
Network Appliance  不受影响             3-Jun-2002
Nortel Networks      未知               4-Jun-2002
OpenBSD              未知               30-May-2002
Red Hat             受影响              3-Jun-2002
Sequent              未知               30-May-2002
SGI                不受影响             30-May-2002
Sony                 未知               30-May-2002
Sun Microsystems   不受影响             31-May-2002
SuSE                受影响              3-Jun-2002
Unisphere Networks 不受影响             30-May-2002
Unisys               未知               30-May-2002
Wind River Systems   未知               30-May-2002

RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2002:105-09)以及相应补丁:
RHSA-2002:105-09:Updated bind packages fix denial of service attack
链接:https://www.redhat.com/support/errata/RHSA-2002-105.html

补丁下载:

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/bind-9.2.1-0.70.src.rpm

alpha:
ftp://updates.redhat.com/7.1/en/os/alpha/bind-9.2.1-0.70.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/bind-devel-9.2.1-0.70.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/bind-utils-9.2.1-0.70.alpha.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/bind-9.2.1-0.70.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/bind-devel-9.2.1-0.70.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/bind-utils-9.2.1-0.70.i386.rpm

ia64:
ftp://updates.redhat.com/7.1/en/os/ia64/bind-9.2.1-0.70.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/bind-devel-9.2.1-0.70.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/bind-utils-9.2.1-0.70.ia64.rpm

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/bind-9.2.1-0.7x.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/bind-9.2.1-0.7x.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/bind-devel-9.2.1-0.7x.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/bind-utils-9.2.1-0.7x.i386.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/bind-9.2.1-0.7x.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/bind-devel-9.2.1-0.7x.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/bind-utils-9.2.1-0.7x.ia64.rpm

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/bind-9.2.1-0.7x.src.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/bind-9.2.1-0.7x.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/bind-devel-9.2.1-0.7x.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/bind-utils-9.2.1-0.7x.i386.rpm
可使用下列命令安装补丁:

rpm -Fvh [文件名]

S.u.S.E.
--------
S.u.S.E.已经为此发布了一个安全公告(SuSE-SA:2002:021)以及相应补丁:
SuSE-SA:2002:021:bind9, bind9-beta: remote denial of service attack
链接:http://www.suse.com/de/support/security/2002_21_bind9.html

补丁下载:

i386 Intel Platform:


SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n4/bind9-9.1.3-197.i386.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n4/bind9-devel-9.1.3-197.i386.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n4/bind9-utils-9.1.3-197.i386.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n4/bind9-beta-9.2.0rc8-184.i386.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n4/bind9-beta-devel-9.2.0rc8-184.i386.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n4/bind9-beta-utils-9.2.0rc8-184.i386.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/bind9-9.1.3-197.src.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/bind9-beta-9.2.0rc8-184.src.rpm


SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/n2/bind9-9.1.3-197.i386.rpm
ftp://ftp.suse.com/pub/suse/i386/update/7.3/n2/bind9-devel-9.1.3-197.i386.rpm
ftp://ftp.suse.com/pub/suse/i386/update/7.3/n2/bind9-utils-9.1.3-197.i386.rpm
ftp://ftp.suse.com/pub/suse/i386/update/7.3/n3/bind9-beta-9.2.0rc3-15.i386.rpm
ftp://ftp.suse.com/pub/suse/i386/update/7.3/n3/bind9-beta-devel-9.2.0rc3-15.i386.rpm
ftp://ftp.suse.com/pub/suse/i386/update/7.3/n3/bind9-beta-utils-9.2.0rc3-15.i386.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/bind9-9.1.3-197.src.rpm
ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/bind9-beta-9.2.0rc3-15.src.rpm


SuSE-7.2
ftp://ftp.suse.com/pub/suse/i386/update/7.2/n2/bind9-9.1.2-30.i386.rpm
SuSE-7.2
ftp://ftp.suse.com/pub/suse/i386/update/7.2/n2/bind9-devel-9.1.2-30.i386.rpm
SuSE-7.2
ftp://ftp.suse.com/pub/suse/i386/update/7.2/n2/bind9-utils-9.1.2-30.i386.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/bind9-9.1.2-30.src.rpm


SuSE-7.1
ftp://ftp.suse.com/pub/suse/i386/update/7.1/n2/bind9-9.1.0-14.i386.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/bind9-9.1.0-14.src.rpm


SuSE-7.0
ftp://ftp.suse.com/pub/suse/i386/update/7.0/n1/bind9-9.1.0-14.i386.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.0/zq1/bind9-9.1.0-14.src.rpm





Sparc Platform:


SuSE-7.3
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n2/bind9-9.1.3-99.sparc.rpm
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n2/bind9-devel-9.1.3-99.sparc.rpm
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n2/bind9-utils-9.1.3-99.sparc.rpm
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n3/bind9-beta-9.2.0rc3-14.sparc.rpm
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n3/bind9-beta-devel-9.2.0rc3-14.sparc.rpm
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n3/bind9-beta-utils-9.2.0rc3-14.sparc.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/zq1/bind9-9.1.3-99.src.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/zq1/bind9-beta-9.2.0rc3-14.src.rpm


SuSE-7.1
ftp://ftp.suse.com/pub/suse/sparc/update/7.1/n2/bind9-9.1.0-12.sparc.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.1/zq1/bind9-9.1.0-12.src.rpm


SuSE-7.0
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/n1/bind9-9.1.0-11.sparc.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/zq1/bind9-9.1.0-11.src.rpm





AXP Alpha Platform:


SuSE-7.1
ftp://ftp.suse.com/pub/suse/axp/update/7.1/n2/bind9-9.1.0-24.alpha.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/7.1/zq1/bind9-9.1.0-24.src.rpm


SuSE-7.0
ftp://ftp.suse.com/pub/suse/axp/update/7.0/n1/bind9-9.1.0-23.alpha.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/7.0/zq1/bind9-9.1.0-23.src.rpm




PPC Power PC Platform:


SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/n2/bind9-9.1.3-157.ppc.rpm
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/n2/bind9-devel-9.1.3-157.ppc.rpm
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/n2/bind9-utils-9.1.3-157.ppc.rpm
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/n3/bind9-beta-9.2.0rc3-24.ppc.rpm
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/n3/bind9-beta-devel-9.2.0rc3-24.ppc.rpm
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/n3/bind9-beta-utils-9.2.0rc3-24.ppc.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/zq1/bind9-9.1.3-157.src.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/zq1/bind9-beta-9.2.0rc3-24.src.rpm


SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/n2/bind9-9.1.0-16.ppc.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/zq1/bind9-9.1.0-16.src.rpm


SuSE-7.0
ftp://ftp.suse.com/pub/suse/ppc/update/7.0/n1/bind9-9.1.0-16.ppc.rpm
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.0/zq1/bind9-9.1.0-16.src.rpm


______________________________________________________________________________


补丁安装方法:

用“rpm -Fhv file.rpm”命令安装文件,完成后,如果rsync服务是用inetd启动的,向inetd进程发送信号重启之。如果rsync是用“rsync --daemon”命令启动的,则再用此命令重启rsync服务。
版权所有,未经许可,不得转载