发布时间 :2001-08-23 00:00:00
修订时间 :2008-09-05 16:25:49

[原文]TCP Wrappers (tcp_wrappers) in FreeBSD 4.1.1 through 4.3 with the PARANOID ACL option enabled does not properly check the result of a reverse DNS lookup, which could allow remote attackers to bypass intended access restrictions via DNS spoofing.

[CNNVD]FreeBSD TCP Wrappers (tcp_wrappers) PARANOID ACL访问限制绕过漏洞(CNNVD-200108-140)

        启用PARANOID ACL选项的FreeBSD 4.1.1到4.3版本的TCP Wrappers (tcp_wrappers)不正确监测DNS反向查找,远程攻击者可以借助DNS欺骗绕过原有访问限制。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:freebsd:freebsd:4.2FreeBSD 4.2
cpe:/o:freebsd:freebsd:4.3FreeBSD 4.3
cpe:/o:freebsd:freebsd:4.1.1FreeBSD 4.1.1

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源

- 漏洞信息

FreeBSD TCP Wrappers (tcp_wrappers) PARANOID ACL访问限制绕过漏洞
高危 未知
2001-08-23 00:00:00 2005-05-02 00:00:00
        启用PARANOID ACL选项的FreeBSD 4.1.1到4.3版本的TCP Wrappers (tcp_wrappers)不正确监测DNS反向查找,远程攻击者可以借助DNS欺骗绕过原有访问限制。

- 公告与补丁


- 漏洞信息

TCP Wrappers PARANOID Reverse DNS ACL Bypass
Remote / Network Access Infrastructure
Loss of Integrity
Exploit Unknown

- 漏洞描述

FreeBSD's distribution of tcp_wrappers contains a flaw that may allow a malicious user access to restricted network resources. The issue is triggered when a flawed check for a numeric result during reverse DNS lookup occurs. It is possible that the flaw may allow bypass of tcp_wrappers 'PARANOID' ACL restrictions.

- 时间线

2001-07-04 Unknow
Unknow Unknow

- 解决方案

Upgrade to 4.3 -STABLE or the RELENG_4_3 security branch released after the correction dates or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds. For versions 4.2 -RELEASE, 4.3 -RELEASE and 4.3 -STABLE released before the correction date, FreeBSD has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者