低危 ISC BIND up to 9.8.8/9.9.7-P2/9.10.2-P3 DNSSEC Key buffer.c 拒绝服务漏洞

CVE编号

CVE-2015-5722

利用情况

暂无

补丁情况

官方补丁

披露时间

2015-09-05
漏洞描述
ISC BIND是一个应用非常广泛的DNS协议的实现,由ISC负责维护。

ISC BIND 'buffer.c'存在安全漏洞,允许远程用户发送特殊的查询,使远程Zone DNS服务器返回特殊的DNSSEC给目标校验解析器,触发该漏洞,使DNS服务崩溃。
解决建议
用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞:
https://kb.isc.org/article/AA-01287/74/CVE-2015-5722%3A-Parsing-malformed-keys-may-cause-BIND-to-exit-due-to-a-failed-assertion-in-buffer.c.html
参考链接
http://lists.apple.com/archives/security-announce/2015/Oct/msg00009.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168686.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165750.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165810.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165996.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167465.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html
http://marc.info/?l=bugtraq&m=144294073801304&w=2
http://rhn.redhat.com/errata/RHSA-2015-1705.html
http://rhn.redhat.com/errata/RHSA-2015-1706.html
http://rhn.redhat.com/errata/RHSA-2015-1707.html
http://rhn.redhat.com/errata/RHSA-2016-0078.html
http://rhn.redhat.com/errata/RHSA-2016-0079.html
http://www.debian.org/security/2015/dsa-3350
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/76605
http://www.securitytracker.com/id/1033452
http://www.ubuntu.com/usn/USN-2728-1
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n...
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n...
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n...
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n...
https://kb.isc.org/article/AA-01287
https://kb.isc.org/article/AA-01305
https://kb.isc.org/article/AA-01306
https://kb.isc.org/article/AA-01307
https://kb.isc.org/article/AA-01438
https://kc.mcafee.com/corporate/index?page=content&id=SB10134
https://security.gentoo.org/glsa/201510-01
https://security.netapp.com/advisory/ntap-20190730-0001/
https://support.apple.com/HT205376
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 isc bind * Up to
(including)
9.10.2
运行在以下环境
应用 isc bind * Up to
(including)
9.9.7
运行在以下环境
系统 debian DPKG * Up to
(excluding)
1:9.9.5.dfsg-12
运行在以下环境
系统 redhat_5 bind * Up to
(excluding)
30:9.3.6-25.P1.el5_11.4
运行在以下环境
系统 redhat_7 bind * Up to
(excluding)
32:9.8.2-0.37.rc1.el6_7.4
运行在以下环境
系统 suse_12 bind * Up to
(excluding)
9.9.6P1-30
运行在以下环境
系统 ubuntu_12.04.5_lts bind9 * Up to
(excluding)
1:9.8.1.dfsg.P1-4ubuntu0.13
运行在以下环境
系统 ubuntu_14.04.6_lts bind9 * Up to
(excluding)
1:9.9.5.dfsg-3ubuntu0.5
阿里云评分
3.3
  • 攻击路径
    远程
  • 攻击复杂度
    容易
  • 权限要求
    无需权限
  • 影响范围
    N/A
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    服务器失陷
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-20 输入验证不恰当
阿里云安全产品覆盖情况