CVE编号
CVE-2007-2926利用情况
暂无补丁情况
官方补丁披露时间
2007-07-25漏洞描述
在回答解析器问题或向从名称服务器发送NOTI FY消息时,IS CBIND9至9.5.0a5在生成DNS查询ID时使用弱随机数发生器,这使得远程攻击者更容易猜测下一个查询ID并执行DNS缓存中毒。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
ftp://aix.software.ibm.com/aix/efixes/security/README | |
ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc | |
http://docs.info.apple.com/article.html?artnum=307041 | |
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01123426 | |
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01154600 | |
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01174368 | |
http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html | |
http://marc.info/?l=bugtraq&m=141879471518471&w=2 | |
http://secunia.com/advisories/26148 | |
http://secunia.com/advisories/26152 | |
http://secunia.com/advisories/26160 | |
http://secunia.com/advisories/26180 | |
http://secunia.com/advisories/26195 | |
http://secunia.com/advisories/26217 | |
http://secunia.com/advisories/26227 | |
http://secunia.com/advisories/26231 | |
http://secunia.com/advisories/26236 | |
http://secunia.com/advisories/26261 | |
http://secunia.com/advisories/26308 | |
http://secunia.com/advisories/26330 | |
http://secunia.com/advisories/26509 | |
http://secunia.com/advisories/26515 | |
http://secunia.com/advisories/26531 | |
http://secunia.com/advisories/26605 | |
http://secunia.com/advisories/26607 | |
http://secunia.com/advisories/26847 | |
http://secunia.com/advisories/26925 | |
http://secunia.com/advisories/27643 | |
http://security.freebsd.org/advisories/FreeBSD-SA-07:07.bind.asc | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103018-1 | |
http://support.avaya.com/elmodocs2/security/ASA-2007-389.htm | |
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=623903 | |
http://www-1.ibm.com/support/search.wss?rs=0&q=IZ02218&apar=only | |
http://www-1.ibm.com/support/search.wss?rs=0&q=IZ02219&apar=only | |
http://www.debian.org/security/2007/dsa-1341 | |
http://www.gentoo.org/security/en/glsa/glsa-200708-13.xml | |
http://www.isc.org/index.pl?/sw/bind/bind-security.php | |
http://www.kb.cert.org/vuls/id/252735 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2007:149 | |
http://www.novell.com/linux/security/advisories/2007_47_bind.html | |
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.022.html | |
http://www.redhat.com/support/errata/RHSA-2007-0740.html | |
http://www.securiteam.com/securitynews/5VP0L0UM0A.html | |
http://www.securityfocus.com/archive/1/474516/100/0/threaded | |
http://www.securityfocus.com/archive/1/474545/100/0/threaded | |
http://www.securityfocus.com/archive/1/474808/100/0/threaded | |
http://www.securityfocus.com/archive/1/474856/100/0/threaded | |
http://www.securityfocus.com/bid/25037 | |
http://www.securityfocus.com/bid/26444 | |
http://www.securitytracker.com/id?1018442 | |
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=sl... | |
http://www.trusteer.com/docs/bind9dns.html | |
http://www.trusteer.com/docs/bind9dns_s.html | |
http://www.trustix.org/errata/2007/0023/ | |
http://www.ubuntu.com/usn/usn-491-1 | |
http://www.us-cert.gov/cas/techalerts/TA07-319A.html | |
http://www.vupen.com/english/advisories/2007/2627 | |
http://www.vupen.com/english/advisories/2007/2662 | |
http://www.vupen.com/english/advisories/2007/2782 | |
http://www.vupen.com/english/advisories/2007/2914 | |
http://www.vupen.com/english/advisories/2007/2932 | |
http://www.vupen.com/english/advisories/2007/3242 | |
http://www.vupen.com/english/advisories/2007/3868 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35575 | |
https://issues.rpath.com/browse/RPL-1587 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | isc | bind | 9.0 | - | |||||
运行在以下环境 | |||||||||
应用 | isc | bind | 9.1 | - | |||||
运行在以下环境 | |||||||||
应用 | isc | bind | 9.2 | - | |||||
运行在以下环境 | |||||||||
应用 | isc | bind | 9.3 | - | |||||
运行在以下环境 | |||||||||
应用 | isc | bind | 9.4 | - | |||||
运行在以下环境 | |||||||||
应用 | isc | bind | 9.5 | - | |||||
运行在以下环境 | |||||||||
应用 | isc | bind | 9.5.0 | - | |||||
运行在以下环境 | |||||||||
系统 | centos_5 | bind9 | * |
Up to (excluding) 9.3.3-9.0.1.el5.i386.rpm |
|||||
运行在以下环境 | |||||||||
系统 | debian_3.1 | bind9 | * |
Up to (excluding) 1:9.2.4-1sarge3 |
|||||
运行在以下环境 | |||||||||
系统 | debian_4.0 | bind9 | * |
Up to (excluding) 1:9.3.4-2etch1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_5 | bind9 | * |
Up to (excluding) 9.3.3-9.0.1.el5 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 传输被破坏
- 服务器危害 无影响
- 全网数量 N/A
还没有评论,来说两句吧...