int(3301)

Vulnerability Bulletins


Múltiples vulnerabilidades en Perl-Net-DNS

Vulnerability classification

Property Value
Confidence level Oficial
Impact Denegación de Servicio
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio estandar

System information

Property Value
Affected manufacturer GNU/Linux
Affected software Perl-Net-DNS

Description

Se han encontrado múltiples vulnerabilidades en Perl-Net-DNS. Las vulnerabilidades son descritas a continuación.

- CVE-2007-3377: Se ha encontrado una vulnerabilidad en el módulo de Perl Net::DNS en las versiones anteriores a la 0.60 en Header.pm. La vulnerabilidad reside al generar secuencias predecibles de Ids con un incremento fijo y al permitir usar el mismo ID para todos los procesos hijo del servidor. Un atacante remoto podría falsificar respuestas DNS.

- CVE-2007-3409: Se ha encontrado una vulnerabilidad en el módulo de Perl Net::DNS en las versiones anteriores a la 0.60. La vulnerabilidad reside en un error al parsear ciertas peticiones DNS. Un atacante remoto podría causar una denegación de servicio mediante un paquete DNS comprimido especialmente diseñado con punteros auto-referenciándose que provocan un bucle infinito.

Solution



Actualización de software

Red Hat (RHSA-2007:0674-3)
Red Hat Desktop (v. 3)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)
https://rhn.redhat.com/

Red Hat (RHSA-2007:0675-2)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
https://rhn.redhat.com/

Mandriva

Corporate Server 3.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/perl-Net-DNS-0.39-2.1.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/perl-Net-DNS-0.39-2.1.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/perl-Net-DNS-0.39-2.1.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/perl-Net-DNS-0.39-2.1.C30mdk.src.rpm

Mandriva Linux 2007
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/perl-Net-DNS-0.58-1.1mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/perl-Net-DNS-0.58-1.1mdv2007.0.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/perl-Net-DNS-0.58-1.1mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/perl-Net-DNS-0.58-1.1mdv2007.0.src.rpm

Corporate Server 4.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/perl-Net-DNS-0.52-1.1.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/perl-Net-DNS-0.52-1.1.20060mlcs4.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/perl-Net-DNS-0.52-1.1.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/perl-Net-DNS-0.52-1.1.20060mlcs4.src.rpm

Mandriva Linux 2007.1
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/perl-Net-DNS-0.59-1.1mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/SRPMS/perl-Net-DNS-0.59-1.1mdv2007.1.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/perl-Net-DNS-0.59-1.1mdv2007.1.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/SRPMS/perl-Net-DNS-0.59-1.1mdv2007.1.src.rpm

SGI
Advanced Linux Environment 3 / RPM / Patch 10431
ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS
Advanced Linux Environment 3 / SRPM / Patch 10431
ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS

Suse Linux
Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux

Debian (DSA-1515-1)

Debian Linux 3.1
Source
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.48.orig.tar.gz
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1.diff.gz
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1.dsc
alpha (DEC Alpha)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1_alpha.deb
amd64 (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1_amd64.deb
arm (ARM)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1_arm.deb
hppa (HP PA RISC)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1_hppa.deb
i386 (Intel ia32)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1_i386.deb
ia64 (Intel ia64)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1_ia64.deb
m68k (Motorola Mc680x0)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1_m68k.deb
mips (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1_mips.deb
mipsel (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1_mipsel.deb
powerpc (PowerPC)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1_powerpc.deb
s390 (IBM S/390)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1_s390.deb
sparc (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1_sparc.deb

Debian Linux 4.0
Source
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.59-1etch1.diff.gz
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.59.orig.tar.gz
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.59-1etch1.dsc
alpha (DEC Alpha)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.59-1etch1_alpha.deb
amd64 (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.59-1etch1_amd64.deb
arm (ARM)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.59-1etch1_arm.deb
hppa (HP PA RISC)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.59-1etch1_hppa.deb
i386 (Intel ia32)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.59-1etch1_i386.deb
ia64 (Intel ia64)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.59-1etch1_ia64.deb
mips (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.59-1etch1_mips.deb
mipsel (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.59-1etch1_mipsel.deb
powerpc (PowerPC)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.59-1etch1_powerpc.deb
s390 (IBM S/390)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.59-1etch1_s390.deb
sparc (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/libn/libnet-dns-perl/libnet-dns-perl_0.59-1etch1_sparc.deb

Standar resources

Property Value
CVE CVE-2007-3377
CVE-2007-3409
BID

Other resources

Red Hat Security Advisory (RHSA-2007:0674-3)
https://rhn.redhat.com/errata/RHSA-2007-0674.html

Red Hat Security Advisory (RHSA-2007:0675-2)
https://rhn.redhat.com/errata/RHSA-2007-0675.html

Mandriva Security Advisory (MDKSA-2007:146)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:146

SGI Security Advisory (20070701-01-P)
ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc

SUSE Security Summary Report (SUSE-SR:2007:017)
http://www.novell.com/linux/security/advisories/2007_17_sr.html

Debian Security Advisory (DSA-1515-1)
http://lists.debian.org/debian-security-announce/2008/msg00080.html

Version history

Version Comments Date
1.0 Aviso emitido 2007-07-13
1.1 Aviso emitido por Mandriva (MDKSA-2007:146) 2007-07-16
1.2 Aviso emitido por SGI (20070701-01-P) 2007-07-25
1.3 Aviso emitido por Suse (SUSE-SR:2007:017) 2007-08-20
1.4 Aviso emitido por Debian (DSA-1515-1) 2008-03-12
Ministerio de Defensa
CNI
CCN
CCN-CERT