Chinaunix首页 | 论坛 | 博客
  • 博客访问: 1576014
  • 博文数量: 317
  • 博客积分: 10283
  • 博客等级: 上将
  • 技术积分: 3566
  • 用 户 组: 普通用户
  • 注册时间: 2007-09-04 11:38
个人简介

哥使用Linux

文章分类

全部博文(317)

分类: LINUX

2009-07-30 08:47:18

BIND Dynamic Update DoS

CVE:
   
CERT:
   
Posting date:
  2009-07-28  
Program Impacted: 
  BIND  
Versions affected: 
  BIND 9 (all versions)
Severity:
  High  
Exploitable:
  remotely  
Summary:
  BIND denial of service (server crash) caused by receipt of a specific remote dynamic update message.

Description:

Urgent: this exploit is public. Please upgrade immediately.

Receipt of a specially-crafted dynamic update message to a zone for which the server is the master may cause BIND 9 servers to exit. Testing indicates that the attack packet has to be formulated against a zone for which that machine is a master. Launching the attack against slave zones does not trigger the assert.

This vulnerability affects all servers that are masters for one or more zones – it is not limited to those that are configured to allow dynamic updates. Access controls will not provide an effective workaround.

dns_db_findrdataset() fails when the prerequisite section of the dynamic update message contains a record of type “ANY” and where at least one RRset for this FQDN exists on the server.

db.c:659: REQUIRE(type != ((dns_rdatatype_t)dns_rdatatype_any)) failed
exiting (due to assertion failure).

Workarounds:

None.

(Some sites may have firewalls that can be configured with packet filtering techniques to prevent nsupdate messages from reaching their nameservers.)

Active exploits:

An active remote exploit is in wide circulation at this time.

Solution:

Upgrade BIND to one of 9.4.3-P3, 9.5.1-P3 or 9.6.1-P1. These versions can be downloaded from:

Acknowledgment:

Matthias Urlichs for reporting the problem.
Tom Daly for methodical follow-on testing.

Revision History:

2009-07-28 Initial text
2009-07-29 Update to reflect Tom Daly's findings

阅读(1692) | 评论(0) | 转发(0) |
0

上一篇:ramfs-rootfs-initramfs

下一篇:opensuse和centos源

给主人留下些什么吧!~~