安全研究

安全漏洞
NSD packet_read_query_section()函数单字节溢出漏洞

发布日期:2009-05-19
更新日期:2009-05-20

受影响系统:
NLnet Labs NSD 3.2.1
NLnet Labs NSD 2.3.7
NLnet Labs NSD 2.0
不受影响系统:
NLnet Labs NSD 3.2.2
描述:
BUGTRAQ  ID: 35029
CVE(CAN) ID: CVE-2009-1755

NSD是一款高性能的开源名称服务器。

NSD服务器的packet.c文件中的packet_read_query_section()函数存在单字节栈溢出漏洞。如果远程攻击者向名称服务器提交了包含有畸形QUESTION字段的查询请求的话,就可以触发这个溢出,导致执行任意指令。

<*来源:Ilja van Sprundel (ilja@suresec.org
  
  链接:http://secunia.com/advisories/35165/
        http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529418
        http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529420
        http://www.debian.org/security/2009/dsa-1803
*>

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-1803-1)以及相应补丁:
DSA-1803-1:New nsd packages fix denial of service
链接:http://www.debian.org/security/2009/dsa-1803

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1.dsc
Size/MD5 checksum:      923 cd9d37244bfa45fb346d99c8d2bab5a0
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1.diff.gz
Size/MD5 checksum:     7539 ceed33911e93f79ddce6a60621685f5a
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6.orig.tar.gz
Size/MD5 checksum:   244341 72428cdacc5bee63b4477becda27bf64

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_alpha.deb
Size/MD5 checksum:   194322 13058fc4ed4a42d2bbc7f7e85fb791fb

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_amd64.deb
Size/MD5 checksum:   177140 9daa54fb763342b1321b7712741de2ea

arm architecture (ARM)

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_arm.deb
Size/MD5 checksum:   163430 a5059831b7ffa616e036270db41804e0

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_hppa.deb
Size/MD5 checksum:   173994 2b21dbd395b75a8cfc613d0635eb019e

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_i386.deb
Size/MD5 checksum:   152192 d88a2ec27887b12bf4e1a484cea49a8b

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_ia64.deb
Size/MD5 checksum:   251552 f5d23f860796da56bc46d0db6a107df3

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_mips.deb
Size/MD5 checksum:   181054 ed978a5748af27f948cdd500246369f7

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_mipsel.deb
Size/MD5 checksum:   180086 5c2e2968fb1d55012f13a91db4111fae

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_powerpc.deb
Size/MD5 checksum:   165350 eea339cca9c3ab1579d8c11e693b06c3

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_s390.deb
Size/MD5 checksum:   192112 1e8f87dee014b95f79342b59a84fb1c2

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_sparc.deb
Size/MD5 checksum:   157064 aef880898bf7112c0785e410d197dedc

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7.orig.tar.gz
Size/MD5 checksum:   230688 31a36167098a0ec9d736e113720c517f
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1.dsc
Size/MD5 checksum:     1347 766ac0c2f837be4be85b0298de82d3fe
http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2.diff.gz
Size/MD5 checksum:     7042 49dcc53aac9ce7f2e7c06c8a96f3bf1a
http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7.orig.tar.gz
Size/MD5 checksum:   818770 37558edef2fe9d9052aafeb73effd4ac
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1.diff.gz
Size/MD5 checksum:     7876 a6d535df5c74f3a62fb3e3336070bbdc
http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2.dsc
Size/MD5 checksum:     1411 8730419f9ee96a1a77ec3ae273f838ce

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_alpha.deb
Size/MD5 checksum:   931424 64ac4633c66fa351313b415703a9bbcd
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_alpha.deb
Size/MD5 checksum:   194632 43b9289a4fdddc6487c98ac6e11bac7a

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_amd64.deb
Size/MD5 checksum:   866786 1042da239b8143dd0517ef81755eff97
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_amd64.deb
Size/MD5 checksum:   178162 0ea3330f941cc695b9a1e2095cb0c23e

arm architecture (ARM)

http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_arm.deb
Size/MD5 checksum:   832386 4af78e6000d3c0f75cc971d5d6b078aa
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_arm.deb
Size/MD5 checksum:   164080 a5d0c30e86acb8f513f85f507122ed77

armel architecture (ARM EABI)

http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_armel.deb
Size/MD5 checksum:   828540 1befd0d9dd80ff7deb38eab73b1967f4
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_armel.deb
Size/MD5 checksum:   164332 6bdaf8f813b935ad8b8672af78ef4a44

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_hppa.deb
Size/MD5 checksum:   868922 ca0188300d8b9deed23b59783fe474e0
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_hppa.deb
Size/MD5 checksum:   172328 fb768d81aea282b1904a1340a0e20305

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_i386.deb
Size/MD5 checksum:   151978 4a6b5c035edc76280213fc2993eecfd5
http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_i386.deb
Size/MD5 checksum:   818688 de76aca5b0faa113e92387913eccfa7b

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_ia64.deb
Size/MD5 checksum:  1057772 7ca12ad0b60fea4b5b5aeb632f4b6e7b
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_ia64.deb
Size/MD5 checksum:   252356 2974009b40200b97cba3f135b5618153

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_mips.deb
Size/MD5 checksum:   873012 cea6d7f5dc4727d10fb731430b1a2354
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_mips.deb
Size/MD5 checksum:   176488 da7e16db1e575ee840bb6b5a1a2512ec

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_mipsel.deb
Size/MD5 checksum:   175756 bf930128f3b8e785d5bb598885e6713e
http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_mipsel.deb
Size/MD5 checksum:   876398 3f1155aa161303c5df9fb732541be8e1

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_powerpc.deb
Size/MD5 checksum:   172556 96e2119d4bc2134cae84361b1d7871ba
http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_powerpc.deb
Size/MD5 checksum:   866798 8e3b5a7240ebcc2e1bb13af4afecef26

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_s390.deb
Size/MD5 checksum:   189470 3cb83c5238794d38d1ca4c68ca1c6bf9
http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_s390.deb
Size/MD5 checksum:   873028 27fd9a0e858dd39f88fefbfe3324306b

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_sparc.deb
Size/MD5 checksum:   159876 7ef6dd367667c534ea4340aea617166c
http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_sparc.deb
Size/MD5 checksum:   823800 42bd1fd97830bf1d45c743952b13a9a3

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

NLnet Labs
----------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html

浏览次数:2963
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障