发布时间 :2001-07-21 00:00:00
修订时间 :2017-10-09 21:29:45

[原文]dnskeygen in BIND 8.2.4 and earlier, and dnssec-keygen in BIND 9.1.2 and earlier, set insecure permissions for a HMAC-MD5 shared secret key file used for DNS Transactional Signatures (TSIG), which allows attackers to obtain the keys and perform dynamic DNS updates.

[CNNVD]BIND dnskeygen和dnssec-keygen不安全权限提升漏洞(CNNVD-200107-160)

        BIND 8.2.4及其更早版本的dnskeygen,和BIND 9.1.2及其更早版本的dnssec-keygen会为HMAC-MD5设置DNS Transactional Signatures (TSIG)共享密钥文件的不安全权限,攻击者可以获取密钥并执行动态DNS上传。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:isc:bind:8.2.4ISC BIND 8.2.4
cpe:/a:isc:bind:9.1.2ISC BIND 9.1.2

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  ISS  20010611 BIND Inadvertent Local Exposure of HMAC-MD5 (TSIG) Keys
(UNKNOWN)  XF  bind-local-key-exposure(6694)

- 漏洞信息

BIND dnskeygen和dnssec-keygen不安全权限提升漏洞
中危 未知
2001-07-21 00:00:00 2005-05-02 00:00:00
        BIND 8.2.4及其更早版本的dnskeygen,和BIND 9.1.2及其更早版本的dnssec-keygen会为HMAC-MD5设置DNS Transactional Signatures (TSIG)共享密钥文件的不安全权限,攻击者可以获取密钥并执行动态DNS上传。

- 公告与补丁


- 漏洞信息

ISC BIND dnskeygen HMAC-MD5 Shared Secret Key File Disclosure
Local Access Required Information Disclosure
Loss of Confidentiality, Loss of Integrity
Exploit Unknown

- 漏洞描述

ISC BIND 8.2.4 and earlier and ISC BIND 9.1.2 and earlier contain a flaw in two helper programs that may lead to an unauthorized information disclosure. The issue is triggered when the dnskeygen utility (BIND 8) or the dnssec-keygen utility (BIND 9) are used to generate key files used in secure communications. The files created are not set with sufficently secure permissions which will disclose of the shared secret keys. These keys can be used to make dynamic updated to the BIND server resulting in a loss of integerty.

- 时间线

2001-06-13 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 8.3 or higher for BIND 8 or 9.1.3rc1 or higher for BIND 9, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete