安全公告详情

NS-SA-2020-0063

2020-12-08 09:12:10

简介

important: bind/net-snmp security update

严重级别

important

主题

An update for bind/net-snmp is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

bind: Bind-utils contains a collection of utilities for querying DNS (Domain Name System) name servers to find out information about Internet hosts. These tools will provide you with the IP addresses for given host names, as well as other information about registered domains and network addresses. You should install bind-utils if you need to get information from DNS name servers.
net-snmp: The net-snmp-perl package contains the perl files to use SNMP from within Perl. Install the net-snmp-perl package, if you want to use mib2c or SNMP with perl.


Security Fix(es):
bind: An assertion failure was found in the way bind implemented the "managed keys" feature. An attacker could use this flaw to cause the named daemon to crash. This flaw is very difficult for an attacker to trigger because it requires an operator to have BIND configured to use a trust anchor managed by the attacker.(CVE-2018-5745)
bind: It was found that the controls for zone transfer were not properly applied to Dynamically Loadable Zones (DLZs). An attacker acting as a DNS client could use this flaw to request and receive a zone transfer of a DLZ even when not permitted to do so by the "allow-transfer" ACL.(CVE-2019-6465)
bind: A flaw was found in the way bind limited the number of TCP clients that can be connected at any given time. A remote attacker could use one TCP client to send a large number of DNS requests over a single connection, causing exhaustion of the pool of file descriptors available to named, and potentially affecting network connections and the management of files such as log files or zone journal files.(CVE-2019-6477)
bind: An assertion failure was found in BIND, which checks the validity of messages containing TSIG resource records. This flaw allows an attacker that knows or successfully guesses the name of the TSIG key used by the server to use a specially-crafted message, potentially causing a BIND server to reach an inconsistent state or cause a denial of service. A majority of BIND servers have an internally-generated TSIG session key whose name is trivially guessable, and that key exposes the vulnerability unless specifically disabled.(CVE-2020-8617)
bind: A flaw was found in BIND, where it does not sufficiently limit the number of fetches that can be performed while processing a referral response. This flaw allows an attacker to cause a denial of service attack. The attacker can also exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.(CVE-2020-8616)
bind: bugfix
net-snmp: _oid_compare in snmplib/snmp_api.c in Net-SNMP before 5.8 has a NULL Pointer Exception bug that can be used by an unauthenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.(CVE-2018-18066)
net-snmp: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F25B5.

影响组件

  • bind
  • net-snmp

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["bind-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-chroot-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-debuginfo-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-export-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-export-libs-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-libs-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-libs-lite-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-license-9.11.4-16.P2.el7_8.6.noarch.rpm","bind-lite-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-pkcs11-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-pkcs11-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-pkcs11-libs-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-pkcs11-utils-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-sdb-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-sdb-chroot-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-utils-9.11.4-16.P2.el7_8.6.x86_64.rpm"],"source":"bind-9.11.4-16.P2.el7_8.6.src.rpm"},{"binary":["net-snmp-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-agent-libs-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-debuginfo-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-devel-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-gui-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-libs-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-perl-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-python-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-sysvinit-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-utils-5.7.2-47.el7.cgslv5.x86_64.rpm"],"source":"net-snmp-5.7.2-47.el7.cgslv5.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["bind-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-chroot-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-libs-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-debuginfo-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-utils-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-export-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-export-libs-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-libs-lite-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-license-9.11.4-16.P2.el7_8.6.noarch.rpm","bind-lite-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-pkcs11-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-pkcs11-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-pkcs11-libs-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-pkcs11-utils-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-sdb-9.11.4-16.P2.el7_8.6.x86_64.rpm","bind-sdb-chroot-9.11.4-16.P2.el7_8.6.x86_64.rpm"],"source":"bind-9.11.4-16.P2.el7_8.6.src.rpm"},{"binary":["net-snmp-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-agent-libs-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-debuginfo-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-devel-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-gui-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-libs-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-perl-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-python-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-sysvinit-5.7.2-47.el7.cgslv5.x86_64.rpm","net-snmp-utils-5.7.2-47.el7.cgslv5.x86_64.rpm"],"source":"net-snmp-5.7.2-47.el7.cgslv5.src.rpm"}]}]}

CVE

参考