CVE-2003-0914
CVSS4.3
发布时间 :2003-12-15 00:00:00
修订时间 :2008-09-10 00:00:00
NMCOPS    

[原文]ISC BIND 8.3.x before 8.3.7, and 8.4.x before 8.4.3, allows remote attackers to poison the cache via a malicious name server that returns negative responses with a large TTL (time-to-live) value.


[CNNVD]ISC BIND否定应答缓冲污染远程拒绝服务攻击漏洞(CNNVD-200312-023)

        
        BIND 8是一款DNS协议实现,named(8)守护程序是Internet域名服务器。
        BIND 8存在一个编程错误,远程攻击者可以利用这个漏洞对BIND服务进行拒绝服务攻击。
        攻击者可以设置恶意DNS消息提送给目标域名服务器,可导致域名服务器为部分域名缓存一个否定的应答。要执行这个攻击,攻击者必须控制域名服务器,并且目标受害者BIND8查询这个域名服务器。攻击者可以设置一个高的TTL值来保持它的否定记录在目标域名服务器上的缓冲足够长,而这个时候依靠DNS的客户端应用程序将不能进行正常DNS响应。
        

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:nixu:namesurfer:suite_3.0.1
cpe:/o:sco:unixware:7.1.1
cpe:/o:sun:solaris:8.0
cpe:/o:compaq:tru64:5.1a_pk4_bl21Compaq Tru64 5.1a PK4_BL21
cpe:/o:compaq:tru64:5.1Compaq Tru64 5.1
cpe:/o:freebsd:freebsd:4.6.2FreeBSD 4.6.2
cpe:/o:compaq:tru64:5.1b_pk1_bl1Compaq Tru64 5.1b PK1_BL1
cpe:/o:freebsd:freebsd:5.0FreeBSD 5.0
cpe:/a:isc:bind:8.2.7ISC BIND 8.2.7
cpe:/a:isc:bind:8.3.5ISC BIND 8.3.5
cpe:/o:ibm:aix:5.1lIBM AIX 5.1L
cpe:/a:isc:bind:8.3.3ISC BIND 8.3.3
cpe:/a:isc:bind:8.3.6ISC BIND 8.3.6
cpe:/o:netbsd:netbsd:1.6.1NetBSD 1.6.1
cpe:/o:freebsd:freebsd:4.7FreeBSD 4.7
cpe:/a:isc:bind:8.2.3ISC BIND 8.2.3
cpe:/o:compaq:tru64:5.1_pk6_bl20Compaq Tru64 5.1 PK6_BL20
cpe:/o:compaq:tru64:4.0f_pk6_bl17Compaq Tru64 4.0f PK6_BL17
cpe:/o:compaq:tru64:4.0f_pk8_bl22Compaq Tru64 4.0f PK8_BL22
cpe:/a:isc:bind:8.3.1ISC BIND 8.3.1
cpe:/o:compaq:tru64:5.1b_pk2_bl22Compaq Tru64 5.1b PK2_BL22
cpe:/o:freebsd:freebsd:4.5FreeBSD 4.5
cpe:/o:freebsd:freebsd:4.9FreeBSD 4.9
cpe:/a:isc:bind:8.4.1ISC BIND 8.4.1
cpe:/o:sun:solaris:7.0::x86
cpe:/o:sun:solaris:7.0
cpe:/a:isc:bind:8.3.2ISC BIND 8.3.2
cpe:/a:isc:bind:8.3.0ISC BIND 8.3.0
cpe:/o:compaq:tru64:5.1a_pk1_bl1Compaq Tru64 5.1a PK1_BL1
cpe:/o:compaq:tru64:5.1_pk5_bl19Compaq Tru64 5.1 PK5_BL19
cpe:/o:hp:hp-ux:11.00HP-UX 11.00
cpe:/o:freebsd:freebsd:4.6FreeBSD 4.6
cpe:/o:compaq:tru64:4.0g_pk4_bl22Compaq Tru64 4.0g PK4_BL22
cpe:/o:sun:solaris:9.0::sparc
cpe:/a:nixu:namesurfer:standard_3.0.1
cpe:/o:compaq:tru64:4.0g_pk3_bl17Compaq Tru64 4.0g PK3_BL17
cpe:/o:compaq:tru64:5.1a_pk5_bl23Compaq Tru64 5.1a PK5_BL23
cpe:/o:compaq:tru64:5.1aCompaq Tru64 5.1a
cpe:/o:compaq:tru64:4.0fCompaq Tru64 4.0f
cpe:/o:netbsd:netbsd:current
cpe:/o:compaq:tru64:4.0gCompaq Tru64 4.0g
cpe:/o:freebsd:freebsd:4.4FreeBSD 4.4
cpe:/o:compaq:tru64:5.1bCompaq Tru64 5.1b
cpe:/a:isc:bind:8.4ISC BIND 8.4
cpe:/o:sun:solaris:9.0::x86
cpe:/a:isc:bind:8.2.6ISC BIND 8.2.6
cpe:/o:compaq:tru64:4.0f_pk7_bl18Compaq Tru64 4.0f PK7_BL18
cpe:/o:compaq:tru64:5.1_pk3_bl17Compaq Tru64 5.1 PK3_BL17
cpe:/o:compaq:tru64:5.1_pk4_bl18Compaq Tru64 5.1 PK4_BL18
cpe:/o:freebsd:freebsd:4.8FreeBSD 4.8
cpe:/o:hp:hp-ux:11.11HP-UX 11.11
cpe:/o:netbsd:netbsd:1.6NetBSD 1.6
cpe:/a:isc:bind:8.2.5ISC BIND 8.2.5
cpe:/o:compaq:tru64:5.1a_pk3_bl3Compaq Tru64 5.1a PK3_BL3
cpe:/a:isc:bind:8.3.4ISC BIND 8.3.4
cpe:/a:isc:bind:8.2.4ISC BIND 8.2.4
cpe:/o:sun:solaris:8.0::x86
cpe:/o:compaq:tru64:5.1a_pk2_bl2Compaq Tru64 5.1a PK2_BL2

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:2011ISC BIND Cache Poison Denial Of Service
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0914
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0914
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200312-023
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/734644
(VENDOR_ADVISORY)  CERT-VN  VU#734644
http://www.debian.org/security/2004/dsa-409
(VENDOR_ADVISORY)  DEBIAN  DSA-409
http://www.trustix.org/errata/misc/2003/TSL-2003-0044-bind.asc.txt
(UNKNOWN)  TRUSTIX  2003-0044
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57434
(UNKNOWN)  SUNALERT  57434
http://secunia.com/advisories/10542
(UNKNOWN)  SECUNIA  10542
ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.33/CSSA-2003-SCO.33.txt
(UNKNOWN)  SCO  CSSA-2003-SCO.33
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-003.0/CSSA-2004-003.0.txt
(UNKNOWN)  SCO  CSSA-2004-003.0

- 漏洞信息

ISC BIND否定应答缓冲污染远程拒绝服务攻击漏洞
中危 未知
2003-12-15 00:00:00 2005-10-20 00:00:00
远程  
        
        BIND 8是一款DNS协议实现,named(8)守护程序是Internet域名服务器。
        BIND 8存在一个编程错误,远程攻击者可以利用这个漏洞对BIND服务进行拒绝服务攻击。
        攻击者可以设置恶意DNS消息提送给目标域名服务器,可导致域名服务器为部分域名缓存一个否定的应答。要执行这个攻击,攻击者必须控制域名服务器,并且目标受害者BIND8查询这个域名服务器。攻击者可以设置一个高的TTL值来保持它的否定记录在目标域名服务器上的缓冲足够长,而这个时候依靠DNS的客户端应用程序将不能进行正常DNS响应。
        

- 公告与补丁

        厂商补丁:
        FreeBSD
        -------
        FreeBSD已经为此发布了一个安全公告(FreeBSD-SA-03:19)以及相应补丁:
        FreeBSD-SA-03:19:bind8 negative cache poison attack
        链接:ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:19.bind.asc
        补丁下载:
        执行以下步骤之一:
        1) 将有漏洞的系统升级到4.9-STABLE;或修正日期后的RELENG_5_1,RELENG_4_9,
        RELENG_4_8或RELENG_4_7安全版本。
        2) 为当前系统打补丁:
        a) 从以下位置下载相关补丁,并使用PGP工具验证附带的PGP签名。
        [FreeBSD 4.9和-STABLE系统]
        # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-836.patch
        # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-836.patch.asc
        [FreeBSD 4.8和5.1系统]
        # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-834.patch
        # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-834.patch.asc
        [FreeBSD 4.4,4.5,4.6,4.7和5.0系统]
        # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-833.patch
        # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-833.patch.asc
        b) 以root执行以下命令:
        # cd /usr/src
        # patch < /path/to/patch
        # cd /usr/src/lib/libbind
        # make obj && make depend && make
        # cd /usr/src/lib/libisc
        # make obj && make depend && make
        # cd /usr/src/usr.sbin/named
        # make obj && make depend && make && make install
        # cd /usr/src/libexec/named-xfer
        # make obj && make depend && make && make install
        在对系统升级或打补丁后,必须重启域名服务。以root执行以下命令:
        # ndc restart
        VI. 更新细节
        下面列出了已修正的FreeBSD版本中每个被修改文件的更新号。
        路径 更新
         版本
        - -------------------------------------------------------------------------
        RELENG_4
         src/contrib/bind/CHANGES 1.1.1.7.2.11
         src/contrib/bind/README 1.1.1.7.2.9
         src/contrib/bind/Version 1.1.1.3.2.10
         src/contrib/bind/bin/named-xfer/named-xfer.c 1.3.2.8
         src/contrib/bind/bin/named/Makefile 1.3.2.6
         src/contrib/bind/bin/named/ns_init.c 1.1.1.2.2.6
         src/contrib/bind/bin/named/ns_resp.c 1.1.1.2.2.11
         src/contrib/bind/bin/nslookup/commands.l 1.4.2.5
         src/contrib/bind/bin/nslookup/debug.c 1.3.2.6
         src/contrib/bind/bin/nslookup/getinfo.c 1.3.2.9
         src/contrib/bind/bin/nslookup/main.c 1.3.2.7
         src/contrib/bind/doc/man/dig.1 1.3.2.4
         src/contrib/bind/doc/man/host.1 1.3.2.5
         src/contrib/bind/doc/man/nslookup.8 1.2.2.5
         src/contrib/bind/port/freebsd/include/port_after.h 1.6.2.9
         src/contrib/bind/port/freebsd/include/port_before.h 1.1.1.2.2.6
        RELENG_5_1
         src/UPDATING 1.251.2.13
         src/sys/conf/newvers.sh 1.50.2.13
         src/contrib/bind/Version 1.1.1.11.2.1
         src/contrib/bind/bin/named/ns_resp.c 1.1.1.11.2.1
        RELENG_5_0
         src/UPDATING 1.229.2.25
         src/sys/conf/newvers.sh 1.48.2.20
         src/contrib/bind/Version 1.1.1.10.2.1
         src/contrib/bind/bin/named/ns_resp.c &

- 漏洞信息 (F32284)

FreeBSD Security Advisory 2003.19 (PacketStormID:F32284)
2003-12-01 00:00:00
The FreeBSD Project,Internet Software Consortium  freebsd.org
advisory
freebsd
CVE-2003-0914
[点击下载]

FreeBSD Security Advisory FreeBSD-SA-03:19.bind - A programming error in BIND 8 named can allow an attacker the ability to arrange for malicious DNS messages to be delivered to a target name server, and cause that name server to cache a negative response for some target domain name. The name server would thereafter respond negatively to legitimate queries for that domain name, resulting in a denial-of-service for applications that require DNS. Affected versions are up to FreeBSD 4.9-RELEASE and 5.1-RELEASE.

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-type" content="text/html;charset=utf-8" />
<title>FreeBSD Security Advisory 2003.19 ≈ Packet Storm</title>
<meta name="description" content="Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers" />
<meta name="keywords" content="security,exploit,advisory,whitepaper,xss,csrf,overflow,scanner,vulnerability" />
<link rel="shortcut icon" href="/img/pss.ico" />
<link rel="stylesheet" media="screen,print,handheld" href="http://packetstatic.com/css1366870159/pss.css" type="text/css" />
<!--[if lt ie 8]><link rel="stylesheet" type="text/css" href="http://packetstatic.com/css1366870159/ie.css" /><![endif]-->
<script type="text/javascript" src="http://packetstatic.com/js1366870155/pt.js"></script>
<script type="text/javascript" src="http://packetstatic.com/js1366870155/pss.js"></script>
<link rel="search" type="application/opensearchdescription+xml" href="http://packetstormsecurity.com/opensearch.xml" title="Packet Storm Site Search" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Headlines" href="http://rss.packetstormsecurity.com/news/" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Recent Files" href="http://rss.packetstormsecurity.com/files/" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Exploits" href="http://rss.packetstormsecurity.com/files/tags/exploit/" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Advisories" href="http://rss.packetstormsecurity.com/files/tags/advisory/" />
</head>
<body id="files">
<div id="t">
   <div id="tc">
      <a id="top" href="/"><img src="http://packetstatic.com/img1353978071/ps_logo.png" width="315" height="65" id="logo" alt="packet storm" /></a>
      <div id="slogan">ignore security and it'll go away
</div>
      <div id="account"><a href="https://packetstormsecurity.com/account/register/">Register</a> | <a href="https://packetstormsecurity.com/account/login/">Login</a></div>
      <div id="search">
        <form method="get" action="/search/"><input type="text" name="q" id="q" maxlength="120" value="Search …" /><button type="submit"></button><div id="q-tabs"><label for="s-files" class="on">Files</label><label for="s-news">News</label><label for="s-users">Users</label><label for="s-authors">Authors</label><input type="radio" value="files" name="s" id="s-files" /><input type="radio" value="news" name="s" id="s-news" /><input type="radio" value="users" name="s" id="s-users" /><input type="radio" value="authors" name="s" id="s-authors" /></div></form>
      </div>
   </div>
    <div id="tn"><div id="tnc">
        <a href="/" id="tn-home"><span>Home</span></a> <a href="/files/" id="tn-files"><span>Files</span></a> <a href="/news/" id="tn-news"><span>News</span></a> <a href="/about/" id="tn-about"><span>About</span></a> <a href="/contact/" id="tn-contact"><span>Contact</span></a> <a href="/submit/" id="tn-submit"><span>Add New</span></a>
    </div></div>
    <div id="tn2"></div>
</div>

<div id="c">

 <div id="cc">
     <div id="m">
    

    
    
    
     
    <div class="h1"><h1>FreeBSD Security Advisory 2003.19</h1></div>
<dl id="F32284" class="file first">
<dt><a class="ico text-plain" href="/files/download/32284/FreeBSD-SA-03%3A19.bind" title="Size: 8 KB"><strong>FreeBSD Security Advisory 2003.19</strong></a></dt>
<dd class="datetime">Posted <a href="/files/date/2003-12-01/" title="02:24:49 UTC">Dec  1, 2003</a></dd>
<dd class="refer">Authored by <a href="/files/author/1243/" class="group">The FreeBSD Project</a>, <a href="/files/author/2979/" class="person">Internet Software Consortium</a> | Site <a href="http://www.freebsd.org/security/">freebsd.org</a></dd>
<dd class="detail"><p>FreeBSD Security Advisory FreeBSD-SA-03:19.bind - A programming error in BIND 8 named can allow an attacker the ability to arrange for malicious DNS messages to be delivered to a target name server, and cause that name server to cache a negative response for some target domain name. The name server would thereafter respond negatively to legitimate queries for that domain name, resulting in a denial-of-service for applications that require DNS. Affected versions are up to FreeBSD 4.9-RELEASE and 5.1-RELEASE.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/freebsd">freebsd</a></dd>
<dd class="cve"><span>advisories</span> | <a href="/files/cve/CVE-2003-0914">CVE-2003-0914</a></dd>
<dd class="md5"><span>MD5</span> | <code>c3e8ac90fc782233f100b528a248a26c</code></dd>
<dd class="act-links"><a href="/files/download/32284/FreeBSD-SA-03%3A19.bind" title="Size: 8 KB" rel="nofollow">Download</a> | <a href="/files/favorite/32284/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/32284/FreeBSD-Security-Advisory-2003.19.html">Comments <span>(0)</span></a></dd>
</dl>
<div id="extra-links"><a href="/files/related/32284/FreeBSD-Security-Advisory-2003.19.html" id="related">Related Files</a><div id="share">
<h2>Share This</h2>
<ul>
<li><iframe scrolling="no" frameborder="0" allowtransparency="true" style="border: medium none; overflow: hidden; width: 80px; height: 21px;" src="http://www.facebook.com/plugins/like.php?href=http://packetstormsecurity.com/files/32284/FreeBSD-Security-Advisory-2003.19.html&layout=button_count&show_faces=true&width=250&action=like&font&colorscheme=light&height=21"></iframe></li><li><iframe scrolling="no" frameborder="0" tabindex="0" allowtransparency="true" src="http://platform0.twitter.com/widgets/tweet_button.html?_=1286138321418&count=horizontal&lang=en&text=FreeBSD%20Security%20Advisory%202003.19&url=http://packetstormsecurity.com/files/32284/FreeBSD-Security-Advisory-2003.19.html&via=packet_storm" style="width: 110px; height: 20px;" title="Twitter"></iframe></li><li><a href="http://www.linkedin.com/shareArticle?mini=true&url=http://packetstormsecurity.com/files/32284/FreeBSD-Security-Advisory-2003.19.html&title=FreeBSD%20Security%20Advisory%202003.19&source=Packet+Storm" class="LinkedIn">LinkedIn</a></li><li><a href="http://www.reddit.com/submit?url=http://packetstormsecurity.com/files/32284/FreeBSD-Security-Advisory-2003.19.html&title=FreeBSD%20Security%20Advisory%202003.19" class="Reddit">Reddit</a></li><li><a href="http://digg.com/submit?phase=2&url=http://packetstormsecurity.com/files/32284/FreeBSD-Security-Advisory-2003.19.html" class="Digg">Digg</a></li><li><a href="http://www.stumbleupon.com/submit?url=http://packetstormsecurity.com/files/32284/FreeBSD-Security-Advisory-2003.19.html&title=FreeBSD%20Security%20Advisory%202003.19" class="StumbleUpon">StumbleUpon</a></li></ul>
</div>
</div>
<div class="h1"><h1>FreeBSD Security Advisory 2003.19</h1></div>
<div class="src">
<div><a href="/mirrors/">Change Mirror</a> <a href="/files/download/32284/FreeBSD-SA-03%3A19.bind">Download</a></div>
<pre><code>-----BEGIN PGP SIGNED MESSAGE-----<br />Hash: SHA1<br /><br />=============================================================================<br />FreeBSD-SA-03:19.bind                                       Security Advisory<br />                                                          The FreeBSD Project<br /><br />Topic:          bind8 negative cache poison attack<br /><br />Category:       contrib<br />Module:         contrib_bind<br />Announced:      2003-11-28<br />Credits:        Internet Software Consortium<br />Affects:        FreeBSD versions through 4.9-RELEASE and 5.1-RELEASE<br />                4-STABLE prior to the correction date<br />Corrected:      2003-11-28 22:13:47 UTC (RELENG_4, 4.9-STABLE)<br />                2003-11-27 00:54:53 UTC (RELENG_5_1, 5.1-RELEASE-p11)<br />                2003-11-27 16:54:01 UTC (RELENG_5_0, 5.0-RELEASE-p19)<br />                2003-11-27 00:56:06 UTC (RELENG_4_9, 4.9-RELEASE-p1)<br />                2003-11-27 16:34:22 UTC (RELENG_4_8, 4.8-RELEASE-p14)<br />                2003-11-27 16:35:06 UTC (RELENG_4_7, 4.7-RELEASE-p24)<br />                2003-11-27 16:37:00 UTC (RELENG_4_6, 4.6.2-RELEASE-p27)<br />                2003-11-27 16:38:36 UTC (RELENG_4_5, 4.5-RELEASE-p37)<br />                2003-11-27 16:40:03 UTC (RELENG_4_4, 4.4-RELEASE-p47)<br />CVE Name:       CAN-2003-0914<br />FreeBSD only:   NO<br /><br />For general information regarding FreeBSD Security Advisories,<br />including descriptions of the fields above, security branches, and the<br />following sections, please visit<br /><URL:http://www.freebsd.org/security/>.<br /><br />I.   Background<br /><br />BIND 8 is an implementation of the Domain Name System (DNS) protocols.<br />The named(8) daemon is the Internet domain name server.<br /><br />II.  Problem Description<br /><br />A programming error in BIND 8 named can result in a DNS message being<br />incorrectly cached as a negative response.<br /><br />III. Impact<br /><br />An attacker may arrange for malicious DNS messages to be delivered<br />to a target name server, and cause that name server to cache a<br />negative response for some target domain name.  The name server would<br />thereafter respond negatively to legitimate queries for that domain<br />name, resulting in a denial-of-service for applications that require<br />DNS.  Almost all Internet applications require DNS, such as the Web,<br />email, and chat networks.<br /><br />IV.  Workaround<br /><br />No workaround is known.<br /><br />V.   Solution<br /><br />Do one of the following:<br /><br />1) Upgrade your vulnerable system to 4.9-STABLE; or to the RELENG_5_1,<br />RELENG_4_9, RELENG_4_8, or RELENG_4_7 security branch dated after the<br />correction date.<br /><br />2) To patch your present system:<br /><br />a) Download the relevant patch from the location below, and verify the<br />detached PGP signature using your PGP utility.<br /><br />[FreeBSD 4.9 and -STABLE systems]<br /># fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-836.patch<br /># fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-836.patch.asc<br /><br />[FreeBSD 4.8 and 5.1 systems]<br /># fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-834.patch<br /># fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-834.patch.asc<br /><br />[FreeBSD 4.4, 4.5, 4.6, 4.7, and 5.0 systems]<br /># fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-833.patch<br /># fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-833.patch.asc<br /><br />b) Execute the following commands as root:<br /><br /># cd /usr/src<br /># patch < /path/to/patch<br /># cd /usr/src/lib/libbind<br /># make obj && make depend && make<br /># cd /usr/src/lib/libisc<br /># make obj && make depend && make<br /># cd /usr/src/usr.sbin/named<br /># make obj && make depend && make && make install<br /># cd /usr/src/libexec/named-xfer<br /># make obj && make depend && make && make install<br /><br />After upgrading or patching your system, you must restart named.<br />Execute the following command as root:<br /><br /># ndc restart<br /><br />VI.  Correction details<br /><br />The following list contains the revision numbers of each file that was<br />corrected in FreeBSD.<br /><br />Branch                                                           Revision<br />  Path<br />- -------------------------------------------------------------------------<br />RELENG_4<br />  src/contrib/bind/CHANGES                                   1.1.1.7.2.11<br />  src/contrib/bind/README                                     1.1.1.7.2.9<br />  src/contrib/bind/Version                                   1.1.1.3.2.10<br />  src/contrib/bind/bin/named-xfer/named-xfer.c                    1.3.2.8<br />  src/contrib/bind/bin/named/Makefile                             1.3.2.6<br />  src/contrib/bind/bin/named/ns_init.c                        1.1.1.2.2.6<br />  src/contrib/bind/bin/named/ns_resp.c                       1.1.1.2.2.11<br />  src/contrib/bind/bin/nslookup/commands.l                        1.4.2.5<br />  src/contrib/bind/bin/nslookup/debug.c                           1.3.2.6<br />  src/contrib/bind/bin/nslookup/getinfo.c                         1.3.2.9<br />  src/contrib/bind/bin/nslookup/main.c                            1.3.2.7<br />  src/contrib/bind/doc/man/dig.1                                  1.3.2.4<br />  src/contrib/bind/doc/man/host.1                                 1.3.2.5<br />  src/contrib/bind/doc/man/nslookup.8                             1.2.2.5<br />  src/contrib/bind/port/freebsd/include/port_after.h              1.6.2.9<br />  src/contrib/bind/port/freebsd/include/port_before.h         1.1.1.2.2.6<br />RELENG_5_1<br />  src/UPDATING                                                 1.251.2.13<br />  src/sys/conf/newvers.sh                                       1.50.2.13<br />  src/contrib/bind/Version                                   1.1.1.11.2.1<br />  src/contrib/bind/bin/named/ns_resp.c                       1.1.1.11.2.1<br />RELENG_5_0<br />  src/UPDATING                                                 1.229.2.25<br />  src/sys/conf/newvers.sh                                       1.48.2.20<br />  src/contrib/bind/Version                                   1.1.1.10.2.1<br />  src/contrib/bind/bin/named/ns_resp.c                       1.1.1.10.2.1<br />RELENG_4_9<br />  src/UPDATING                                              1.73.2.89.2.2<br />  src/sys/conf/newvers.sh                                   1.44.2.32.2.2<br />  src/contrib/bind/Version                                1.1.1.3.2.9.2.1<br />  src/contrib/bind/bin/named/ns_resp.c                   1.1.1.2.2.10.2.1<br />RELENG_4_8<br />  src/UPDATING                                             1.73.2.80.2.16<br />  src/sys/conf/newvers.sh                                  1.44.2.29.2.15<br />  src/contrib/bind/Version                                1.1.1.3.2.8.2.1<br />  src/contrib/bind/bin/named/ns_resp.c                    1.1.1.2.2.9.2.1<br />RELENG_4_7<br />  src/UPDATING                                             1.73.2.74.2.27<br />  src/sys/conf/newvers.sh                                  1.44.2.26.2.26<br />  src/contrib/bind/Version                                1.1.1.3.2.7.2.1<br />  src/contrib/bind/bin/named/ns_resp.c                    1.1.1.2.2.7.2.2<br />RELENG_4_6<br />  src/UPDATING                                             1.73.2.68.2.56<br />  src/sys/conf/newvers.sh                                  1.44.2.23.2.44<br />  src/contrib/bind/Version                                1.1.1.3.2.6.2.2<br />  src/contrib/bind/bin/named/ns_resp.c                    1.1.1.2.2.6.2.3<br />RELENG_4_5<br />  src/UPDATING                                             1.73.2.50.2.54<br />  src/sys/conf/newvers.sh                                  1.44.2.20.2.38<br />  src/contrib/bind/Version                                1.1.1.3.2.4.4.2<br />  src/contrib/bind/bin/named/ns_resp.c                    1.1.1.2.2.4.4.3<br />RELENG_4_4<br />  src/UPDATING                                             1.73.2.43.2.55<br />  src/sys/conf/newvers.sh                                  1.44.2.17.2.46<br />  src/contrib/bind/Version                                1.1.1.3.2.4.2.2<br />  src/contrib/bind/bin/named/ns_resp.c                    1.1.1.2.2.4.2.3<br />- -------------------------------------------------------------------------<br /><br />VII. References<br /><br /><URL:http://www.kb.cert.org/vuls/id/734644><br />-----BEGIN PGP SIGNATURE-----<br />Version: GnuPG v1.2.3 (FreeBSD)<br /><br />iD8DBQE/x8/PFdaIBMps37IRAsl8AJ9zgqn4QmO08d9zj9de8/uGKIQBNgCfeHKC<br />tM9nSOzoCrM+O+TpNn6ewt4=<br />=PJi2<br />-----END PGP SIGNATURE-----<br /></code></pre>
</div>
<div id="comments">
<h2>Comments</h2><a href="http://rss.packetstormsecurity.com/files/32284" class="rss-cmt"><img src="http://packetstatic.com/img1353978071/bt_rss.gif" width="16" height="16" alt="RSS Feed" /> <span>Subscribe to this comment feed</span></a><br /><p id="comment-none">No comments yet, be the first!</p></div>
<div id="comment-form" style="display:none"></div><div id="comment-login"><a href="https://packetstormsecurity.com/account/login/">Login</a> or <a href="https://packetstormsecurity.com/account/register/">Register</a> to post a comment</div>
    
    
     </div>
    
      <div id="adblock">
        
      </div>
      <div id="mn">
        <div class="mn-like-us">
<ul>
<li><a href="https://twitter.com/packet_storm"><img src="http://packetstatic.com/img1353978071/s_twitter.png" width="24" height="24" alt="Follow on Twitter" /> Follow us on Twitter</a></li>
<li><a href="https://www.facebook.com/packetstormfeed"><img src="http://packetstatic.com/img1353978071/s_facebook.png" width="24" height="24" alt="Follow on Facebook" /> Follow us on Facebook</a></li>
<li><a href="/feeds"><img src="http://packetstatic.com/img1353978071/s_rss.png" width="24" height="24" alt="View RSS Feeds" /> Subscribe to an RSS Feed</a></li>
</ul>
</div>
<div class="mn-like-us"><ul><li style="border-color: #afa; background: #efe"><a style="border-color: #6f6; background: #afa; color: #060; padding-left: 0;" href="/bugbounty/"><span style="color:#393">$ $ $</span>  Write Exploits? Get Paid!</a></li></ul></div>
<div>
<form id="cal" action="/files/cal/" method="post">
<h2>File Archive:</h2><h3>April 2013</h3>
<button id="cal-prev" name="cal-prev" type="button" value="2013-4"><span><</span></button><ul class="dotw"><li>Su</li><li>Mo</li><li>Tu</li><li>We</li><li>Th</li><li>Fr</li><li>Sa</li></ul>
<ul><li></li><li class="low"><a href="/files/date/2013-04-01/">1</a><div class="stats"><div class="point"></div><div class="date">Apr 1st</div><div class="count">10 Files</div></div></li><li class="med"><a href="/files/date/2013-04-02/">2</a><div class="stats"><div class="point"></div><div class="date">Apr 2nd</div><div class="count">15 Files</div></div></li><li class="med"><a href="/files/date/2013-04-03/">3</a><div class="stats"><div class="point"></div><div class="date">Apr 3rd</div><div class="count">16 Files</div></div></li><li class="med"><a href="/files/date/2013-04-04/">4</a><div class="stats"><div class="point"></div><div class="date">Apr 4th</div><div class="count">15 Files</div></div></li><li class="med"><a href="/files/date/2013-04-05/">5</a><div class="stats"><div class="point"></div><div class="date">Apr 5th</div><div class="count">30 Files</div></div></li><li class="low"><a href="/files/date/2013-04-06/">6</a><div class="stats"><div class="point"></div><div class="date">Apr 6th</div><div class="count">4 Files</div></div></li></ul>
<ul><li class="low"><a href="/files/date/2013-04-07/">7</a><div class="stats"><div class="point"></div><div class="date">Apr 7th</div><div class="count">12 Files</div></div></li><li class="med"><a href="/files/date/2013-04-08/">8</a><div class="stats"><div class="point"></div><div class="date">Apr 8th</div><div class="count">23 Files</div></div></li><li class="med"><a href="/files/date/2013-04-09/">9</a><div class="stats"><div class="point"></div><div class="date">Apr 9th</div><div class="count">26 Files</div></div></li><li class="med"><a href="/files/date/2013-04-10/">10</a><div class="stats"><div class="point"></div><div class="date">Apr 10th</div><div class="count">30 Files</div></div></li><li class="high"><a href="/files/date/2013-04-11/">11</a><div class="stats"><div class="point"></div><div class="date">Apr 11th</div><div class="count">63 Files</div></div></li><li class="low"><a href="/files/date/2013-04-12/">12</a><div class="stats"><div class="point"></div><div class="date">Apr 12th</div><div class="count">12 Files</div></div></li><li class="low"><a href="/files/date/2013-04-13/">13</a><div class="stats"><div class="point"></div><div class="date">Apr 13th</div><div class="count">3 Files</div></div></li></ul>
<ul><li class="low"><a href="/files/date/2013-04-14/">14</a><div class="stats"><div class="point"></div><div class="date">Apr 14th</div><div class="count">2 Files</div></div></li><li class="low"><a href="/files/date/2013-04-15/">15</a><div class="stats"><div class="point"></div><div class="date">Apr 15th</div><div class="count">11 Files</div></div></li><li class="med"><a href="/files/date/2013-04-16/">16</a><div class="stats"><div class="point"></div><div class="date">Apr 16th</div><div class="count">16 Files</div></div></li><li class="med"><a href="/files/date/2013-04-17/">17</a><div class="stats"><div class="point"></div><div class="date">Apr 17th</div><div class="count">15 Files</div></div></li><li class="med"><a href="/files/date/2013-04-18/">18</a><div class="stats"><div class="point"></div><div class="date">Apr 18th</div><div class="count">15 Files</div></div></li><li class="med"><a href="/files/date/2013-04-19/">19</a><div class="stats"><div class="point"></div><div class="date">Apr 19th</div><div class="count">19 Files</div></div></li><li class="low"><a href="/files/date/2013-04-20/">20</a><div class="stats"><div class="point"></div><div class="date">Apr 20th</div><div class="count">3 Files</div></div></li></ul>
<ul><li class="low"><a href="/files/date/2013-04-21/">21</a><div class="stats"><div class="point"></div><div class="date">Apr 21st</div><div class="count">3 Files</div></div></li><li class="low"><a href="/files/date/2013-04-22/">22</a><div class="stats"><div class="point"></div><div class="date">Apr 22nd</div><div class="count">12 Files</div></div></li><li class="low"><a href="/files/date/2013-04-23/">23</a><div class="stats"><div class="point"></div><div class="date">Apr 23rd</div><div class="count">13 Files</div></div></li><li class="low"><a href="/files/date/2013-04-24/">24</a><div class="stats"><div class="point"></div><div class="date">Apr 24th</div><div class="count">11 Files</div></div></li><li class="none today"><a href="/files/date/2013-04-25/">25</a><div class="stats"><div class="point"></div><div class="date">Apr 25th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2013-04-26/">26</a><div class="stats"><div class="point"></div><div class="date">Apr 26th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2013-04-27/">27</a><div class="stats"><div class="point"></div><div class="date">Apr 27th</div><div class="count">0 Files</div></div></li></ul>
<ul><li class="none"><a href="/files/date/2013-04-28/">28</a><div class="stats"><div class="point"></div><div class="date">Apr 28th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2013-04-29/">29</a><div class="stats"><div class="point"></div><div class="date">Apr 29th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2013-04-30/">30</a><div class="stats"><div class="point"></div><div class="date">Apr 30th</div><div class="count">0 Files</div></div></li><li></li><li></li><li></li><li></li></ul>
</form></div>
<div id="mn-top-author" class="top-ten">
<h2>Top Authors In Last 30 Days</h2>
<ul>
<li><a href="/files/authors/3786">Mandriva</a> <span>126 files</span></li>
<li><a href="/files/authors/4676">Red Hat</a> <span>44 files</span></li>
<li><a href="/files/authors/3695">Ubuntu</a> <span>28 files</span></li>
<li><a href="/files/authors/2985">Cisco Systems</a> <span>17 files</span></li>
<li><a href="/files/authors/2821">Debian</a> <span>11 files</span></li>
<li><a href="/files/authors/4612">HP</a> <span>11 files</span></li>
<li><a href="/files/authors/8993">juan vazquez</a> <span>9 files</span></li>
<li><a href="/files/authors/8123">Michael Messner</a> <span>7 files</span></li>
<li><a href="/files/authors/8035">High-Tech Bridge SA</a> <span>7 files</span></li>
<li><a href="/files/authors/8982">Slackware Security Team</a> <span>7 files</span></li>
</ul>
</div>
<div id="mn-tag-file"><h2>File Tags</h2><ul><li><a href="/files/tags/activex/">ActiveX</a> <span>(873)</span></li><li><a href="/files/tags/advisory/">Advisory</a> <span>(55,748)</span></li><li><a href="/files/tags/arbitrary/">Arbitrary</a> <span>(8,747)</span></li><li><a href="/files/tags/bbs/">BBS</a> <span>(2,859)</span></li><li><a href="/files/tags/bypass/">Bypass</a> <span>(575)</span></li><li><a href="/files/tags/cgi/">CGI</a> <span>(847)</span></li><li><a href="/files/tags/code_execution/">Code Execution</a> <span>(3,370)</span></li><li><a href="/files/tags/cracker/">Cracker</a> <span>(685)</span></li><li><a href="/files/tags/csrf/">CSRF</a> <span>(1,857)</span></li><li><a href="/files/tags/denial_of_service/">DoS</a> <span>(14,917)</span></li><li><a href="/files/tags/encryption/">Encryption</a> <span>(2,115)</span></li><li><a href="/files/tags/exploit/">Exploit</a> <span>(29,367)</span></li><li><a href="/files/tags/file_inclusion/">File Inclusion</a> <span>(3,386)</span></li><li><a href="/files/tags/firewall/">Firewall</a> <span>(748)</span></li><li><a href="/files/tags/info_disclosure/">Info Disclosure</a> <span>(1,212)</span></li><li><a href="/files/tags/intrusion_detection/">Intrusion Detection</a> <span>(663)</span></li><li><a href="/files/tags/java/">Java</a> <span>(1,320)</span></li><li><a href="/files/tags/javascript/">JavaScript</a> <span>(503)</span></li><li><a href="/files/tags/kernel/">Kernel</a> <span>(2,825)</span></li><li><a href="/files/tags/local/">Local</a> <span>(10,570)</span></li><li><a href="/files/tags/magazine/">Magazine</a> <span>(503)</span></li><li><a href="/files/tags/overflow/">Overflow</a> <span>(8,311)</span></li><li><a href="/files/tags/perl/">Perl</a> <span>(1,213)</span></li><li><a href="/files/tags/php/">PHP</a> <span>(3,984)</span></li><li><a href="/files/tags/proof_of_concept/">Proof of Concept</a> <span>(1,589)</span></li><li><a href="/files/tags/protocol/">Protocol</a> <span>(1,839)</span></li><li><a href="/files/tags/python/">Python</a> <span>(705)</span></li><li><a href="/files/tags/remote/">Remote</a> <span>(19,367)</span></li><li><a href="/files/tags/root/">Root</a> <span>(2,443)</span></li><li><a href="/files/tags/scanner/">Scanner</a> <span>(1,317)</span></li><li><a href="/files/tags/tool/">Security Tool</a> <span>(5,638)</span></li><li><a href="/files/tags/shell/">Shell</a> <span>(1,943)</span></li><li><a href="/files/tags/shellcode/">Shellcode</a> <span>(772)</span></li><li><a href="/files/tags/sniffer/">Sniffer</a> <span>(781)</span></li><li><a href="/files/tags/spoof/">Spoof</a> <span>(1,653)</span></li><li><a href="/files/tags/sql_injection/">SQL Injection</a> <span>(12,575)</span></li><li><a href="/files/tags/tcp/">TCP</a> <span>(1,961)</span></li><li><a href="/files/tags/trojan/">Trojan</a> <span>(541)</span></li><li><a href="/files/tags/udp/">UDP</a> <span>(713)</span></li><li><a href="/files/tags/virus/">Virus</a> <span>(573)</span></li><li><a href="/files/tags/vulnerability/">Vulnerability</a> <span>(22,058)</span></li><li><a href="/files/tags/web/">Web</a> <span>(5,497)</span></li><li><a href="/files/tags/paper/">Whitepaper</a> <span>(2,850)</span></li><li><a href="/files/tags/x86/">x86</a> <span>(585)</span></li><li><a href="/files/tags/xss/">XSS</a> <span>(12,267)</span></li><li><a href="/files/tags/">Other</a></li></ul></div><div id="mn-arch-file"><h2>File Archives</h2><ul><li><a href="/files/date/2013-04/">April 2013</a></li><li><a href="/files/date/2013-03/">March 2013</a></li><li><a href="/files/date/2013-02/">February 2013</a></li><li><a href="/files/date/2013-01/">January 2013</a></li><li><a href="/files/date/2012-12/">December 2012</a></li><li><a href="/files/date/2012-11/">November 2012</a></li><li><a href="/files/date/2012-10/">October 2012</a></li><li><a href="/files/date/2012-09/">September 2012</a></li><li><a href="/files/date/2012-08/">August 2012</a></li><li><a href="/files/date/2012-07/">July 2012</a></li><li><a href="/files/date/2012-06/">June 2012</a></li><li><a href="/files/date/2012-05/">May 2012</a></li><li><a href="/files/date/">Older</a></li></ul></div><div id="mn-os-file"><h2>Systems</h2><ul><li><a href="/files/os/aix/">AIX</a> <span>(371)</span></li><li><a href="/files/os/apple/">Apple</a> <span>(1,067)</span></li><li><a href="/files/os/bsd/">BSD</a> <span>(305)</span></li><li><a href="/files/os/cisco/">Cisco</a> <span>(1,393)</span></li><li><a href="/files/os/debian/">Debian</a> <span>(4,133)</span></li><li><a href="/files/os/fedora/">Fedora</a> <span>(1,663)</span></li><li><a href="/files/os/freebsd/">FreeBSD</a> <span>(1,053)</span></li><li><a href="/files/os/gentoo/">Gentoo</a> <span>(2,646)</span></li><li><a href="/files/os/hpux/">HPUX</a> <span>(735)</span></li><li><a href="/files/os/iphone/">iPhone</a> <span>(99)</span></li><li><a href="/files/os/irix/">IRIX</a> <span>(218)</span></li><li><a href="/files/os/juniper/">Juniper</a> <span>(63)</span></li><li><a href="/files/os/linux/">Linux</a> <span>(23,246)</span></li><li><a href="/files/os/osx/">Mac OS X</a> <span>(453)</span></li><li><a href="/files/os/mandriva/">Mandriva</a> <span>(2,472)</span></li><li><a href="/files/os/netbsd/">NetBSD</a> <span>(244)</span></li><li><a href="/files/os/openbsd/">OpenBSD</a> <span>(422)</span></li><li><a href="/files/os/redhat/">RedHat</a> <span>(3,170)</span></li><li><a href="/files/os/slackware/">Slackware</a> <span>(447)</span></li><li><a href="/files/os/solaris/">Solaris</a> <span>(1,524)</span></li><li><a href="/files/os/suse/">SUSE</a> <span>(1,440)</span></li><li><a href="/files/os/ubuntu/">Ubuntu</a> <span>(3,312)</span></li><li><a href="/files/os/unix/">UNIX</a> <span>(7,126)</span></li><li><a href="/files/os/unixware/">UnixWare</a> <span>(152)</span></li><li><a href="/files/os/windows/">Windows</a> <span>(4,233)</span></li><li><a href="/files/os/">Other</a></li></ul></div>
      </div>

  </div>

</div>

<div id="f">
  <div id="fc">

    <div class="f-box" style="margin: 50px 0 0 0;">
        <a href="/"><img src="http://packetstatic.com/img1353978071/ps_logo.png" width="218" alt="packet storm" /></a>
    <p class="copy">© 2013 Packet Storm. All rights reserved.</p>
    </div>

    <div class="f-box">
    <dl>
      <dt>Site Links</dt>
      <dd><a href="/news/date/">News by Month</a></dd>
      <dd><a href="/news/tags/">News Tags</a></dd>
      <dd><a href="/files/date/">Files by Month</a></dd>
      <dd><a href="/files/tags/">File Tags</a></dd>
      <dd><a href="/files/directory/">File Directory</a></dd>
    </dl>    
    </div>

    <div class="f-box">
    <dl>
      <dt>About Us</dt>
      <dd><a href="/about/">History & Purpose</a></dd>
      <dd><a href="/contact/">Contact Information</a></dd>
      <dd><a href="/legal/tos.html">Terms of Service</a></dd>
      <dd><a href="/legal/privacy.html">Privacy Statement</a></dd>
      <dd><a href="/legal/copyright.html">Copyright Information</a></dd>
    </dl>
    </div>

    <div class="f-box">
	<dl>
      <dt>Services</dt>
      <dd><a href="/services/">Security Services</a></dd>
      <dt style="margin-top:1.5em;">Hosting By</dt>
      <dd><a href="http://www.rokabear.com/">Rokabear</a></dd>
      <dd><a href="/mirrors/">Global Mirror List</a></dd>
    </dl>   
    </div>
    <div class="f-box">
    <ul class="f-follow">
     <li><a href="https://twitter.com/packet_storm"><img width="24" height="24" alt="Follow on Twitter" src="http://packetstatic.com/img1353978071/s_twitter.png" /> Follow us on Twitter</a></li>
     <li><a href="https://www.facebook.com/packetstormfeed"><img width="24" height="24" alt="Follow on Facebook" src="http://packetstatic.com/img1353978071/s_facebook.png" /> Follow us on Facebook</a></li>
     <li><a href="/feeds"><img width="24" height="24" alt="View RSS Feeds" src="http://packetstatic.com/img1353978071/s_rss.png" /> Subscribe to an RSS Feed</a></li>
    </ul>
    </div>

  </div>
</div>

<div id="o-box"><img src="http://packetstatic.com/img1353978071/o_close.png" alt="close" height="30" width="30" id="o-close" /><div id="o-main"></div></div>


<script type="text/javascript"> var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-18885198-1']); _gaq.push(['_setDomainName', '.packetstormsecurity.com']); _gaq.push(['_trackPageview']); (function() {var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s);})(); </script><noscript><img src="http://www.google-analytics.com/__utm.gif?utmwv=1.3&utmn=1890076585&utmcs=ISO-8859-1&utmsr=31337x31337&utmsc=32-bit&utmul=en-us&utmje=0&utmfl=-&utmcn=1&utmdt=FreeBSD%20Security%20Advisory%202003.19%u2248%20Packet%20Storm&utmhn=packetstormsecurity.com&utmr=-&utmp=%2Ffiles%2F32284%2F&utmac=UA-18885198-1&utmcc=__utma%3D32867617.1890076585.1366883500.1366883500.1366883500.1%3B%2B__utmz%3D32867617.1366883500.1.1.utmccn%3D(direct)%7Cutmcsr%3D(direct)%7Cutmcmd%3D(none)" width="2" height="2" alt="" /></noscript>
<!-- Thu, 25 Apr 2013 09:51:37 GMT -->
</body>
</html>
    

- 漏洞信息

2866
ISC BIND Negative Record Cache Poisoning
Loss of Integrity

- 漏洞描述

BIND prior to 8.3.7 contain a flaw that allows for a remote Denial of Service attack. An attacker who controls a DNS server can cause vulnerable servers to attempt to cache "negative" records. Legitimate clients requesting DNS service would not be able to function until the "time to live" (TTL) for the negative record had expired.

- 时间线

2003-11-26 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 8.3.7, 8.4.3, 9.x or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

ISC BIND Negative Cache Poison Denial Of Service Vulnerability
Unknown 9114
Yes No
2003-11-26 12:00:00 2009-07-12 12:56:00
This vulnerability was announced in a vendor changelog.

- 受影响的程序版本

Sun Solaris 9_x86
Sun Solaris 9
Sun Solaris 8_x86
Sun Solaris 8_sparc
Sun Solaris 7.0_x86
Sun Solaris 7.0
Sun Linux 5.0
+ Sun LX50
Sun Cobalt RaQ XTR
Sun Cobalt RaQ 4
Sun Cobalt Qube 3
SCO Unixware 7.1.1
SCO OpenLinux Workstation 3.1.1
SCO OpenLinux Server 3.1.1
SCO Open Server 5.0.7
SCO Open Server 5.0.6
Nixu NameSurfer Suite 3.0.1
Nixu NameSurfer Standard Edition 3.0.1
NetBSD NetBSD 1.6.1
NetBSD NetBSD 1.6
NetBSD NetBSD Current
ISC BIND 8.4.1
ISC BIND 8.4
ISC BIND 8.3.6
ISC BIND 8.3.5
ISC BIND 8.3.4
+ Apple Mac OS X 10.2.4
+ Apple Mac OS X 10.2.3
+ Apple Mac OS X Server 10.2.4
+ Apple Mac OS X Server 10.2.3
+ S.u.S.E. Linux Personal 8.2
ISC BIND 8.3.3
+ Apple Mac OS X 10.2.2
+ Apple Mac OS X 10.2.1
+ Apple Mac OS X 10.2
+ Apple Mac OS X 10.1.5
+ Apple Mac OS X 10.1.4
+ Apple Mac OS X 10.1.3
+ Apple Mac OS X 10.1.2
+ Apple Mac OS X 10.1.1
+ Apple Mac OS X 10.1
+ Apple Mac OS X 10.1
+ Apple Mac OS X Server 10.2.2
+ Apple Mac OS X Server 10.2.1
+ Apple Mac OS X Server 10.2
+ Apple Mac OS X Server 10.0
+ Debian Linux 3.0
+ FreeBSD FreeBSD 4.7 -RELEASE
+ FreeBSD FreeBSD 4.7
+ MandrakeSoft Single Network Firewall 7.2
+ Mandriva Linux Mandrake 7.2
+ OpenPKG OpenPKG 1.1
+ OpenPKG OpenPKG Current
ISC BIND 8.3.2
+ FreeBSD FreeBSD 4.6 -RELEASE
+ FreeBSD FreeBSD 4.6
ISC BIND 8.3.1
ISC BIND 8.3 .0
ISC BIND 8.2.7
ISC BIND 8.2.6
+ Conectiva Linux 6.0
+ OpenPKG OpenPKG 1.0
+ Trustix Secure Linux 1.5
+ Trustix Secure Linux 1.2
ISC BIND 8.2.5
+ OpenPKG OpenPKG 1.0
+ Trustix Secure Linux 1.5
ISC BIND 8.2.4
+ S.u.S.E. Linux 8.1
+ S.u.S.E. Linux 8.0
+ S.u.S.E. Linux 7.3 sparc
+ S.u.S.E. Linux 7.3 ppc
+ S.u.S.E. Linux 7.3
+ Trustix Secure Linux 1.2
ISC BIND 8.2.3
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Workstation 3.1.1
+ Caldera OpenLinux Workstation 3.1
+ Debian Linux 2.2
+ EnGarde Secure Linux 1.0.1
+ Immunix Immunix OS 7+
IBM AIX 5.1 L
IBM AIX 4.3.3
IBM AIX 5.2
IBM AIX 5.1
HP Tru64 UNIX Compaq Secure Web Server 5.1 A
HP Tru64 UNIX Compaq Secure Web Server 5.1
HP Tru64 UNIX Compaq Secure Web Server 4.0 G
HP Tru64 UNIX Compaq Secure Web Server 4.0 F
HP Tru64 5.1 b
HP Tru64 5.1 a PK4 (BL21)
HP Tru64 5.1 PK6 (BL20)
HP HP-UX 11.11
HP HP-UX 11.0
FreeBSD FreeBSD 5.0
FreeBSD FreeBSD 4.9
FreeBSD FreeBSD 4.8
FreeBSD FreeBSD 4.7
FreeBSD FreeBSD 4.6.2
FreeBSD FreeBSD 4.6
FreeBSD FreeBSD 4.5
FreeBSD FreeBSD 4.4
Compaq Tru64 5.1 b PK2 (BL22)
Compaq Tru64 5.1 b PK1 (BL1)
Compaq Tru64 5.1 b
Compaq Tru64 5.1 a PK5 (BL23)
Compaq Tru64 5.1 a PK4 (BL21)
Compaq Tru64 5.1 a PK3 (BL3)
Compaq Tru64 5.1 a PK2 (BL2)
Compaq Tru64 5.1 a PK1 (BL1)
Compaq Tru64 5.1 a
Compaq Tru64 5.1 PK6 (BL20)
Compaq Tru64 5.1 PK5 (BL19)
Compaq Tru64 5.1 PK4 (BL18)
Compaq Tru64 5.1 PK3 (BL17)
Compaq Tru64 5.1
Compaq Tru64 4.0 g PK4 (BL22)
Compaq Tru64 4.0 g PK3 (BL17)
Compaq Tru64 4.0 g
Compaq Tru64 4.0 f PK8 (BL22)
Compaq Tru64 4.0 f PK7 (BL18)
Compaq Tru64 4.0 f PK6 (BL17)
Compaq Tru64 4.0 f
Compaq TCP/IP Services For OpenVMS 5.3
- Compaq OpenVMS 5.3
Compaq TCP/IP Services For OpenVMS 5.1
BorderWare Firewall Server 7.0
ISC BIND 8.4.3
ISC BIND 8.4.2
ISC BIND 8.3.7

- 不受影响的程序版本

ISC BIND 8.4.3
ISC BIND 8.4.2
ISC BIND 8.3.7

- 漏洞讨论

ISC BIND has been reported prone to a cache poisoning vulnerability. This issue may be exploited to trigger a denial of service affect in the vulnerable service. It has been reported that the denial of service affect will last until the bad DNS record expires from the cache.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

ISC BIND has released upgrades to address this issue.

Sun has released an updated alert (Sun Alert ID: 57434) that contains a workaround for Solaris 7,8 and 9 based systems. Fixes are also available.

Sun has made fixes available for Qube3 and RaQ4 systems.

IBM has released a revised advisory stating that APARS to address this issue for AIX 4.3.3, 5.1.0 and 5.2.0 are available. Customers are advised to apply these APARS as soon as possible. Further information regarding obtaining and applying appropriate APARS can be found in the referenced advisory.

Sun have released a security update to address this issue in the Sun RAQ XTR. Please see references section for further details. Fixes are linked below.

Hewlett-Packard has released an advisory (SSRT3653) and early release patches to address this issue in Tru64 based systems. Customers are advised to apply relative fixes as soon as possible. Further detail is available in the referenced advisory.

SCO has released an advisory (CSSA-2003-SCO.33) and fixes to address this issue. Customers are advised to apply relative fixes as soon as possible. Further detail is available in the referenced advisory, fixes are linked below.

Hewlett-Packard has released an advisory (HPSBUX0311-303) and fixes to address this issue in HP-UX 11.00 and 11.11. Customers are advised to apply relative fixes as soon as possible. Further detail is available in the referenced advisory, fixes are linked below. HP revised this bulletin to include a patch for HP-UX 11.11 to replace the preliminary depot that was available.

NetBSD have reported that fixes for this issue are pending, alternatively NetBSD have advised that users can use BIND 9 from pkgsrc to make their systems invulnerable to this issue.

Nixu have advised customers who are running a Nixu NameSurfer installation to upgrade their visible nameservers to BIND versions 9.2.1 or newer.

IBM have released an APAR to address this issue in IBM AIX 5.1L. Affected users are advised to download and apply fixes as soon as posible.

Engarde Linux has released an advisory (ESA-20031126-031) and fixes to address this issue. Guardian Digital Secure Network Users are advised to apply appropriate fixes as soon as possible. Further details regarding obtaining and applying these fixes can be found in the referenced advisory.

Trustix has released an advisory and fixes to address this issue.

Immunix has released an advisory and fixes to address this issue.

SuSE Linux has released an advisory (SuSE-SA:2003:047) and fixes to address this issue. Users are advised to apply appropriate fixes as soon as possible. Further details regarding obtaining and applying these fixes can be found in the referenced advisory.

FreeBSD has released a security advisory (FreeBSD-SA-03:19.bind) including patches to address this issue. Patches are available below.

NetBSD has released a security advisory 2003-018 including patches to address this issue. Please see the referenced advisory for more information.

IBM has released an advisory with fixes to address this issue in AIX 4.3.3, AIX 5.1.0 and AIX 5.2.0. Further information can be obtained by contacting the vendor. See referenced advisory for more details.

Debian has released an advisory (DSA 409-1) to address this issue. Please see the attached advisory for details on obtaining and applying fixes.

HP has released an advisory (SSRT3653) to address this issue in OpenVMS. Please see the attached advisory for details on obtaining and applying fixes. The following fixes have been released:

For VAX only TCP/IP V5.3:
TCPIP$BIND_SERVER.EXE_ECO_G_V_V53
For VAX only TCP/IP V5.1:
TCPIP$BIND_SERVER.EXE_ECO_I_V_V51
For Alpha only TCP/IP V5.1:
TCPIP$BIND_SERVER.EXE_ECO_I_A_V51

SCO has released advisory CSSA-2004-003.0 for OpenLinux.

BorderWare has released patches dealing with this issue for their Firewall Server product. Please contact the vendor for more information and details on obtaining the patch.

Hewlett-Packard has released advisory HPSBTU01066 along with a resolution dealing with this issue. Please see the referenced advisory for more information.

SCO has released advisory SCOSA-2005.4 to address this issue in OpenServer 5.0.6 and OpenServer 5.0.7. Please see the referenced advisory for more information.

Fixes:


Sun Cobalt RaQ 4

Sun Solaris 8_sparc

IBM AIX 5.1

IBM AIX 5.2

Sun Cobalt RaQ XTR

Sun Solaris 7.0

Sun Solaris 9

Sun Cobalt Qube 3

Sun Solaris 9_x86

Sun Solaris 7.0_x86

Sun Solaris 8_x86

HP HP-UX 11.0

HP HP-UX 11.11

SCO OpenLinux Server 3.1.1

SCO OpenLinux Workstation 3.1.1

IBM AIX 4.3.3

FreeBSD FreeBSD 4.4

FreeBSD FreeBSD 4.5

FreeBSD FreeBSD 4.6

FreeBSD FreeBSD 4.7

FreeBSD FreeBSD 4.8

FreeBSD FreeBSD 4.9

FreeBSD FreeBSD 5.0

Compaq TCP/IP Services For OpenVMS 5.1

IBM AIX 5.1 L

Compaq TCP/IP Services For OpenVMS 5.3

SCO Unixware 7.1.1

ISC BIND 8.2.3

ISC BIND 8.2.4

ISC BIND 8.2.6

ISC BIND 8.3 .0

ISC BIND 8.3.1

ISC BIND 8.3.2

ISC BIND 8.3.3

ISC BIND 8.3.4

ISC BIND 8.3.5

ISC BIND 8.3.6

ISC BIND 8.4

ISC BIND 8.4.1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站