安全公告详情

NS-SA-2021-0017

2021-03-09 13:05:16

简介

important: bind/dbus security update

严重级别

important

主题

An update for bind/dbus is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

bind: The bind-devel package contains full version of the header files and libraries required for development with ISC BIND 9
dbus: This package contains libraries and header files needed for developing software that uses D-BUS.


Security Fix(es):
bind: A flaw was found in bind. An assertion failure can occur when trying to verify a truncated response to a TSIG-signed request. The highest threat from this vulnerability is to system availability.(CVE-2020-8622)
bind: A flaw was found in bind. An assertion failure can occur when a specially crafted query for a zone signed with an RSA key. BIND must be compiled with "--enable-native-pkcs11" for the system to be affected. The highest threat from this vulnerability is to system availability.(CVE-2020-8623)
bind: A flaw was found in bind. Updates to "Update-policy" rules of type "subdomain" are treated as if they were of type "zonesub" which allows updates to all parts of the zone along with the intended subdomain. The highest threat from this vulnerability is to data integrity.(CVE-2020-8624)
bind: BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via certain SIG queries, which cause an assertion failure when multiple RRsets are returned.(CVE-2006-4095)
bind: Unspecified vulnerability in query.c in ISC BIND 9.4.0, and 9.5.0a1 through 9.5.0a3, when recursion is enabled, allows remote attackers to cause a denial of service (daemon exit) via a sequence of queries processed by the query_addsoa function.(CVE-2007-2241)
bind: The default access control lists (ACL) in ISC BIND 9.4.0, 9.4.1, and 9.5.0a1 through 9.5.0a5 do not set the allow-recursion and allow-query-cache ACLs, which allows remote attackers to make recursive queries and query the cache.(CVE-2007-2925)
bind: ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.(CVE-2007-2926)
bind: Red Hat Enterprise Linux 5 and Fedora install the Bind /etc/rndc.key file with world-readable permissions, which allows local users to perform unauthorized named commands, such as causing a denial of service by stopping named.(CVE-2007-6283)
bind: Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.(CVE-2008-0122)
bind: The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."(CVE-2008-1447)
bind: BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.(CVE-2009-0025)
bind: The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an ANY record in the prerequisite section of a crafted dynamic update message, as exploited in the wild in July 2009.(CVE-2009-0696)
bind: BIND 9.7.1 and 9.7.1-P1, when a recursive validating server has a trust anchor that is configured statically or via DNSSEC Lookaside Validation (DLV), allows remote attackers to cause a denial of service (infinite loop) via a query for an RRSIG record whose answer is not in the cache, which causes BIND to repeatedly send RRSIG queries to the authoritative servers.(CVE-2010-0213)
bind: ISC BIND 9.8.x before 9.8.0-P1, when Response Policy Zones (RPZ) RRset replacement is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an RRSIG query.(CVE-2011-1907)
bind: Off-by-one error in named in ISC BIND 9.x before 9.7.3-P1, 9.8.x before 9.8.0-P2, 9.4-ESV before 9.4-ESV-R4-P1, and 9.6-ESV before 9.6-ESV-R4-P1 allows remote DNS servers to cause a denial of service (assertion failure and daemon exit) via a negative response containing large RRSIG RRsets.(CVE-2011-1910)
bind: query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.(CVE-2011-4313)
bind: ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.(CVE-2012-1667)
bind: libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.(CVE-2013-2266)
bind: resolver.c in ISC BIND 9.8.5 before 9.8.5-P1, 9.9.3 before 9.9.3-P1, and 9.6-ESV-R9 before 9.6-ESV-R9-P1, when a recursive resolver is configured, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a record in a malformed zone.(CVE-2013-3919)
bind: The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.(CVE-2013-4854)
bind: A denial of service flaw was found in the way BIND handled queries for NSEC3-signed zones. A remote attacker could use this flaw against an authoritative name server that served NCES3-signed zones by sending a specially crafted query, which, when processed, would cause named to crash.(CVE-2014-0591)
bind: A race condition leading to denial of service was found in the way bind handled certain malformed packets. A remote attacker who could cause the bind resolver to perform queries on a server, which responds deliberately with malformed answers, could cause named to exit.(CVE-2019-6471)
bind: A flaw was found in BIND, where it does not sufficiently limit the number of fetches that can be performed while processing a referral response. This flaw allows an attacker to cause a denial of service attack. The attacker can also exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.(CVE-2020-8616)
bind: An assertion failure was found in BIND, which checks the validity of messages containing TSIG resource records. This flaw allows an attacker that knows or successfully guesses the name of the TSIG key used by the server to use a specially-crafted message, potentially causing a BIND server to reach an inconsistent state or cause a denial of service. A majority of BIND servers have an internally-generated TSIG session key whose name is trivially guessable, and that key exposes the vulnerability unless specifically disabled.(CVE-2020-8617)
bind: bugfix
dbus: A flaw was found in dbus. The implementation of DBUS_COOKIE_SHA1 is susceptible to a symbolic link attack. A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause the DBusServer to read and write in unintended locations resulting in an authentication bypass. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2019-12749)
dbus: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F29B5.

影响组件

  • bind
  • dbus

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["bind-export-libs-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-license-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.noarch.rpm","bind-pkcs11-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-sdb-chroot-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-chroot-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-pkcs11-utils-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-debuginfo-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-pkcs11-devel-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-sdb-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-lite-devel-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-pkcs11-libs-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-libs-lite-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-devel-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-libs-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-utils-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-export-devel-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm"],"source":"bind-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.src.rpm"},{"binary":["dbus-debuginfo-1.10.24-15.el7.cgslv5.0.2.g05e9818.x86_64.rpm","dbus-devel-1.10.24-15.el7.cgslv5.0.2.g05e9818.x86_64.rpm","dbus-tests-1.10.24-15.el7.cgslv5.0.2.g05e9818.x86_64.rpm","dbus-libs-1.10.24-15.el7.cgslv5.0.2.g05e9818.x86_64.rpm","dbus-x11-1.10.24-15.el7.cgslv5.0.2.g05e9818.x86_64.rpm","dbus-1.10.24-15.el7.cgslv5.0.2.g05e9818.x86_64.rpm","dbus-doc-1.10.24-15.el7.cgslv5.0.2.g05e9818.noarch.rpm"],"source":"dbus-1.10.24-15.el7.cgslv5.0.2.g05e9818.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["bind-export-libs-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-license-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.noarch.rpm","bind-pkcs11-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-sdb-chroot-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-chroot-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-pkcs11-utils-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-debuginfo-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-pkcs11-devel-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-sdb-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-lite-devel-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-pkcs11-libs-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-libs-lite-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-devel-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-libs-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-utils-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm","bind-export-devel-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.x86_64.rpm"],"source":"bind-9.11.4-26.P2.el7_9.2.cgslv5.0.1.gd99f173.src.rpm"},{"binary":["dbus-debuginfo-1.10.24-15.el7.cgslv5.0.2.g05e9818.x86_64.rpm","dbus-devel-1.10.24-15.el7.cgslv5.0.2.g05e9818.x86_64.rpm","dbus-tests-1.10.24-15.el7.cgslv5.0.2.g05e9818.x86_64.rpm","dbus-libs-1.10.24-15.el7.cgslv5.0.2.g05e9818.x86_64.rpm","dbus-x11-1.10.24-15.el7.cgslv5.0.2.g05e9818.x86_64.rpm","dbus-1.10.24-15.el7.cgslv5.0.2.g05e9818.x86_64.rpm","dbus-doc-1.10.24-15.el7.cgslv5.0.2.g05e9818.noarch.rpm"],"source":"dbus-1.10.24-15.el7.cgslv5.0.2.g05e9818.src.rpm"}]}]}

CVE

参考