int(517)

Vulnerability Bulletins


Vulnerabilidad en demonio BIND DNS

Vulnerability classification

Property Value
Confidence level Oficial
Impact Denegación de Servicio
Dificulty Avanzado
Required attacker level Acceso remoto con cuenta

System information

Property Value
Affected manufacturer UNIX
Affected software Solaris 7, 8, 9
FreeBSD 4.x,5.x
Suse 7.3, 8.0, 8.1, 8.2
AIX 4.3.3
AIX 5.1.0
AIX 5.2.0
HP Tru64 UNIX 5.1B & BIND 8
HP Tru64 UNIX 5.1A & BIND 8
HP Tru64 UNIX 5.1& BIND 8
HP Tru64 UNIX 4.0G & BIND 8
HP Tru64 UNIX 4.0F & BIND 8

Description

Se ha descubierto una vulnerabilidad en solaris que permitiría a un usuario privilegiado remotamente causar que el demonio DNS (in.named(1M)) retenga respuestas inválidas, con lo cual la rutina de resolución resolver(3RESOLV)) no encuentra nombres de hosts válidos. Ello provoca una Denegación de Servicio.

Solution



Actualización de software

Solaris

x86
Solaris 7 parche 106938-08 o posterior
http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=106938&rev=08
Solaris 8 parche 109326-13 o posterior
http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=109326&rev=13
Solaris 9 parche 112970-06 o posterior
http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=112970&rev=06

Sparc
Solaris 7 parche 106939-08 o posterior
http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=106939&rev=08
Solaris 8 parche 109327-13 o posterior
http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=109327&rev=13
Solaris 9 parche 114354-05 o posterior
http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=114354&rev=05

FreeBSD
FreeBSD 4.9 y sistemas STABLE
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-836.patch
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-836.patch.asc

FreeBSD 4.8 y 5.1
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-834.patch
fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-834.patch.asc

FreeBSD 4.4, 4.5, 4.6, 4.7, y 5.0
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-833.patch
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:19/bind-833.patch.asc

SuSE Linux

SuSE 8.2 - Intel i386
Paquete RPM
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/bind8-8.3.4-64.i586.rpm
Parche
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/bind8-8.3.4-64.i586.patch.rpm
Fuentes
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/src/bind8-8.3.4-64.src.rpm

SuSE 8.1 - Intel i386
Paquete RPM
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/bind8-8.2.4-336.i586.rpm
Parche
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/bind8-8.2.4-336.i586.patch.rpm
Fuentes
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/bind8-8.2.4-336.src.rpm

SuSE 8.0 - Intel i386
Paquete RPM
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n2/bind8-8.2.4-334.i386.rpm
Parche
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n2/bind8-8.2.4-334.i386.patch.rpm
Fuentes
ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/bind8-8.2.4-334.src.rpm

SuSE 7.3 - Intel i386
Paquete RPM
ftp://ftp.suse.com/pub/suse/i386/update/7.3/n2/bind8-8.2.4-334.i386.rpm
Fuentes
ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/bind8-8.2.4-334.src.rpm

SuSE 7.3 - Sparc
Paquete RPM
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n2/bind8-8.2.4-128.sparc.rpm
Fuentes
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/zq1/bind8-8.2.4-128.src.rpm

SuSE 7.3 - PowerPC
Paquete RPM
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/n2/bind8-8.2.4-243.ppc.rpm
Fuentes
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/zq1/bind8-8.2.4-243.src.rpm

IBM AIX
AIX 4.3.3: APAR IY49899
AIX 5.1.0: APAR IY49881
AIX 5.2.0: APAR IY49883
http://www-912.ibm.com/eserver/support/fixes/fcgui.jsp

HP Tru64 UNIX
HP Tru64 UNIX 5.1B & PK3
http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT0020650-V51BB24-ES-20031112
HP Tru64 UNIX 5.1B & PK2
http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT0020665-V51BB22-ES-20031113
HP Tru64 UNIX 5.1A & PK6
http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT0023082-V51AB24-ES-20040728.tar
HP Tru64 UNIX 5.1A & PK5
http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT0020694-V51AB23-ES-20031114
HP Tru64 UNIX 5.1 & PK6
http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT0020695-V51B20-ES-20031114
HP Tru64 UNIX 4.0F & PK4
http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=DUXKIT0020667-V40FB22-ES-20031113
HP Tru64 UNIX 4.0G & PK4
http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT0020666-V40GB22-ES-20031113

Standar resources

Property Value
CVE CAN-2003-0914
BID

Other resources

Sun Alert ID: 57434
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57434&zone_32=category%3Asecurity

SuSE-SA:2003:047
http://www.suse.de/de/security/2003_47_bind8.html

IBM Security Advisory
https://techsupport.services.ibm.com/server/pseries.subscriptionSvcs?mode=1&heading=AIX433&topic=SECURITY&month=200404

HP Security Advisory HPSBTU01066
http://www5.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTU01066

Version history

Version Comments Date
1.0 Aviso emitido 2003-11-27
1.1 Aviso emitido por IBM 2004-04-08
1.2 Aviso emitido por HP (HPSBTU01066) 2004-08-09
Ministerio de Defensa
CNI
CCN
CCN-CERT