请选择 进入手机版 | 继续访问电脑版

技术控

    今日:411| 主题:54081
收藏本版 (1)
最新软件应用技术尽在掌握

[其他] ISC updates critical DoS bug in BIND DNS software

[复制链接]
魅惑了誰的眼 发表于 2016-10-1 10:22:59
165 2

立即注册CoLaBug.com会员,免费获得投稿人的专业资料,享用更多功能,玩转个人品牌!

您需要 登录 才可以下载或查看,没有帐号?立即注册

x

ISC updates critical DoS bug in BIND DNS software

ISC updates critical DoS bug in BIND DNS software

The ISC (Internet Systems Consortium) patched two vulnerabilities in domain name system software BIND, one of which was referred to as a "critical error condition" in the software.
BIND is the most commonly deployed DNS server on the Internet, translating domain names into IP addresses so that users can access applications and remote servers without having to track IP addresses. BIND is the de facto standard on Linux and other Unix-based machines, so a vulnerability in the software affects a large number of servers and applications.
  The latest BIND update, versions 9.9.9-P3, 9.10.4-P3, and 9.11.0rc3, patched a denial-of-service flaw (CVE-2016-2776) that could be exploited using specially crafted DNS request packets. The issue was uncovered internally by ISC and affects all servers that can receive request packets from any source, ISC said in its advisory . Affected versions include 9.0.x to 9.8.x, 9.9.0 to 9.9.9-P2, 9.9.3-S1 to 9.9.9-S3, 9.10.0 to 9.10.4-P2, and 9.11.0a1 to 9.11.0rc1.
Users are advised to update their BIND installations to the "patched release most closely related to your current version of BIND," or versions 9.9.9-P3, 9.10.4-P3, and 9.11.0rc3. The fix is also in the BIND 9 Supported Preview edition as version 9.9.9-S5.
"Testing by ISC has uncovered a critical error condition which can occur when a nameserver is constructing a response," said ISC, which has been maintaining BIND since 2000.
The issue is tied to a defect in the rendering of messages into packets when the nameserver is constructing a response. If the vulnerability is exploited via specially crafted requests, it could trigger an assertion failure in buffer.c while constructing a response to a specific type of a query. The exploit would succeed "even if the apparent source address isn't allowed to make queries (i.e. doesn't match 'allow-query'."
  The issue was marked high-severity with a 7.8 score on the Common Vulnerability Scoring System because it can be exploited remotely. Red Hat's advisory says that the attack doesn't require any authentication, additional privileges, or user interaction to successfully exploit the flaw, making the issue particularly dangerous.
It's easy to downplay the severity of a denial-of-service flaw in a security advisory, especially when compared against privilege escalation or remote code execution. However, because BIND is central to implementing the DNS protocol on the Internet, a vulnerability that could be exploited to knock vulnerable systems offline would have a wide-reaching impact. A specially crafted query that could crash the name server daemon isn't just an inconvenience or a minor setback. It could bring portions of the Internet to its knees.
ISC has not seen any evidence indicating attackers were aware of, or had already exploited, the vulnerability, but cautioned that all servers that can receive request packets from any source should be updated. ISC has patched the faults in its distribution, and various Linux distributions, such as Red Hat, are already shipping fixes for their own BIND implementations.
  This BIND update also fixed a previously-disclosed medium-severity DoS condition (CVE-2016-2775) in BIND's implementation of the lightweight resolver (lwresd) protocol. The error stems from the fact that a server can terminate if the resolver tries to resolve a query name, which, when combined with a search list, exceeds the maximum allowable length.
"A server which is affected by this defect will terminate with a segmentation fault error, resulting in a denial of service to client programs attempting to resolve names," ISC said in the advisory.
The vulnerability is also "troublesome" for embedded devices running BIND, as remediation involves fixing BIND and then updating all the devices with the embedded software. "We will again see organizations scrambling to determine if they use the component, and where," said Mike Pittenger, VP of Security Strategy at Black Duck Software.



上一篇:Creating an executable file using Cython
下一篇:2016硅谷程序员求职访谈实录(二十九)
刘懿 发表于 2016-10-2 11:45:21
楼上的很有激情啊!
回复 支持 反对

使用道具 举报

南晴 发表于 2016-10-2 21:49:12
我是应该赞魅惑了誰的眼呢还是应该赞呢
回复 支持 反对

使用道具 举报

*滑动验证:
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

我要投稿

推荐阅读


回页顶回复上一篇下一篇回列表
手机版/CoLaBug.com ( 粤ICP备05003221号 | 文网文[2010]257号 )

© 2001-2017 Comsenz Inc. Design: Dean. DiscuzFans.

返回顶部 返回列表