Bind 9出现漏洞 全球网络安全面临威胁

   一个可以让黑客毁坏全球互联网的漏洞刚刚被披露出来,这一漏洞出现在被全世界所用的DNS服务器标准bind 9上.
   Bind的支持组织Internet Systems Consortium (ISC)当地时间7月28日警告.Bind 9版本包含这一漏洞,服务器管理员需要尽快升级Bind到9.4.3-P3, 9.5.1-P3 或 9.6.1-P1以规避风险,否则黑客将可以轻松攻击未经修补的服务器,目前攻击代码已经出现.
   根据官方声明,此漏洞只对状态为master的bind服务器有影响。
   详细查看:BIND Dynamic Update DoS

   官方转载:

BIND Dynamic Update DoS

CVE:
  CVE-2009-0696  
CERT:
  VU#725188  
Posting date:
  2009-07-28  
Program Impacted: 
  BIND  
Versions affected: 
  BIND 9 (all versions)
Severity:
  High  
Exploitable:
  remotely  
Summary:
  BIND denial of service (server crash) caused by receipt of a specific remote dynamic update message.

Description:

Urgent: this exploit is public. Please upgrade immediately.

Receipt of a specially-crafted dynamic update message to a zone for which the server is the master may cause BIND 9 servers to exit. Testing indicates that the attack packet has to be formulated against a zone for which that machine is a master. Launching the attack against slave zones does not trigger the assert.

This vulnerability affects all servers that are masters for one or more zones – it is not limited to those that are configured to allow dynamic updates. Access controls will not provide an effective workaround.

dns_db_findrdataset() fails when the prerequisite section of the dynamic update message contains a record of type “ANY” and where at least one RRset for this FQDN exists on the server.

db.c:659: REQUIRE(type != ((dns_rdatatype_t)dns_rdatatype_any)) failed
exiting (due to assertion failure).

Workarounds:

None.

(Some sites may have firewalls that can be configured with packet filtering techniques to prevent nsupdate messages from reaching their nameservers.)

Active exploits:

An active remote exploit is in wide circulation at this time.

Acknowledgment:

Matthias Urlichs for reporting the problem.
Tom Daly for methodical follow-on testing.

Revision History:

2009-07-28 Initial text
2009-07-29 Update to reflect Tom Daly's findings

标签: Bind
评论: 0 | 引用: 0 | 阅读: 4884