低危 ISC BIND up to 9.9.7-P1/9.10.2-P2 TKEY Query Packet Crash 拒绝服务漏洞

CVE编号

CVE-2015-5477

利用情况

POC 已公开

补丁情况

官方补丁

披露时间

2015-07-30
漏洞描述
在9.9.7-P2之前在ISC BIND 9.x中的named,在9.10.2-P3之前的9.10.x中的named允许远程攻击者通过TKEY查询导致拒绝服务(REQUIRE断言失败和守护进程退出)。

解决建议
厂商已发布了漏洞修复程序,请及时关注更新(或目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载):
https://kb.isc.org/article/AA-01272
参考链接
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10718
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163006.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163007.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163015.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html
http://marc.info/?l=bugtraq&m=144000632319155&w=2
http://marc.info/?l=bugtraq&m=144017354030745&w=2
http://marc.info/?l=bugtraq&m=144181171013996&w=2
http://marc.info/?l=bugtraq&m=144294073801304&w=2
http://packetstormsecurity.com/files/132926/BIND-TKEY-Query-Denial-Of-Service.html
http://rhn.redhat.com/errata/RHSA-2015-1513.html
http://rhn.redhat.com/errata/RHSA-2015-1514.html
http://rhn.redhat.com/errata/RHSA-2015-1515.html
http://rhn.redhat.com/errata/RHSA-2016-0078.html
http://rhn.redhat.com/errata/RHSA-2016-0079.html
http://www.debian.org/security/2015/dsa-3319
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/76092
http://www.securitytracker.com/id/1033100
http://www.ubuntu.com/usn/USN-2693-1
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n...
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n...
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n...
https://kb.isc.org/article/AA-01272
https://kb.isc.org/article/AA-01305
https://kb.isc.org/article/AA-01306
https://kb.isc.org/article/AA-01307
https://kb.isc.org/article/AA-01438
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10126
https://security.gentoo.org/glsa/201510-01
https://security.netapp.com/advisory/ntap-20160114-0001/
https://support.apple.com/kb/HT205032
https://www.exploit-db.com/exploits/37721/
https://www.exploit-db.com/exploits/37723/
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 isc bind * Up to
(including)
9.10.2
运行在以下环境
应用 isc bind * Up to
(including)
9.9.7
运行在以下环境
系统 debian DPKG * Up to
(excluding)
1:9.9.5.dfsg-11
运行在以下环境
系统 redhat_5 bind97 * Up to
(excluding)
32:9.7.0-21.P2.el5_11.2
运行在以下环境
系统 redhat_7 bind * Up to
(excluding)
32:9.8.2-0.37.rc1.el6_7.2
运行在以下环境
系统 suse_12 bind * Up to
(excluding)
9.9.6P1-30
运行在以下环境
系统 ubuntu_12.04.5_lts bind9 * Up to
(excluding)
1:9.8.1.dfsg.P1-4ubuntu0.12
运行在以下环境
系统 ubuntu_14.04.6_lts bind9 * Up to
(excluding)
1:9.9.5.dfsg-3ubuntu0.4
阿里云评分
3.3
  • 攻击路径
    远程
  • 攻击复杂度
    容易
  • 权限要求
    无需权限
  • 影响范围
    N/A
  • EXP成熟度
    POC 已公开
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    服务器失陷
  • 全网数量
    N/A
CWE-ID 漏洞类型
阿里云安全产品覆盖情况