漏洞信息详情
Nlnetlabs NSD packet_read_query_section()函数单字节溢出漏洞
漏洞简介
NSD是一款高性能的开源名称服务器。
NSD服务器的packet.c文件中的packet_read_query_section()函数存在单字节栈溢出漏洞。如果远程攻击者向名称服务器提交了包含有畸形QUESTION字段的查询请求的话,就可以触发这个溢出,导致执行任意指令。
漏洞公告
目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html
http://www.debian.org/security/2009/dsa-1803
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1.dsc
Size/MD5 checksum:923 cd9d37244bfa45fb346d99c8d2bab5a0
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1.diff.gz
Size/MD5 checksum: 7539 ceed33911e93f79ddce6a60621685f5a
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6.orig.tar.gz
Size/MD5 checksum: 244341 72428cdacc5bee63b4477becda27bf64
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_alpha.deb
Size/MD5 checksum: 194322 13058fc4ed4a42d2bbc7f7e85fb791fb
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_amd64.deb
Size/MD5 checksum: 177140 9daa54fb763342b1321b7712741de2ea
arm architecture (ARM)
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_arm.deb
Size/MD5 checksum: 163430 a5059831b7ffa616e036270db41804e0
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_hppa.deb
Size/MD5 checksum: 173994 2b21dbd395b75a8cfc613d0635eb019e
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_i386.deb
Size/MD5 checksum: 152192 d88a2ec27887b12bf4e1a484cea49a8b
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_ia64.deb
Size/MD5 checksum: 251552 f5d23f860796da56bc46d0db6a107df3
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_mips.deb
Size/MD5 checksum: 181054 ed978a5748af27f948cdd500246369f7
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_mipsel.deb
Size/MD5 checksum: 180086 5c2e2968fb1d55012f13a91db4111fae
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_powerpc.deb
Size/MD5 checksum: 165350 eea339cca9c3ab1579d8c11e693b06c3
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_s390.deb
Size/MD5 checksum: 192112 1e8f87dee014b95f79342b59a84fb1c2
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_sparc.deb
Size/MD5 checksum: 157064 aef880898bf7112c0785e410d197dedc
Debian GNU/Linux 5.0 alias lenny
Source archives:
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7.orig.tar.gz
Size/MD5 checksum: 230688 31a36167098a0ec9d736e113720c517f
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1.dsc
Size/MD5 checksum: 1347 766ac0c2f837be4be85b0298de82d3fe
http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2.diff.gz
Size/MD5 checksum: 7042 49dcc53aac9ce7f2e7c06c8a96f3bf1a
http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7.orig.tar.gz
Size/MD5 checksum: 818770 37558edef2fe9d9052aafeb73effd4ac
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1.diff.gz
Size/MD5 checksum: 7876 a6d535df5c74f3a62fb3e3336070bbdc
http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2.dsc
Size/MD5 checksum: 1411 8730419f9ee96a1a77ec3ae273f838ce
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_alpha.deb
Size/MD5 checksum: 931424 64ac4633c66fa351313b415703a9bbcd
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_alpha.deb
Size/MD5 checksum: 194632 43b9289a4fdddc6487c98ac6e11bac7a
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_amd64.deb
Size/MD5 checksum: 866786 1042da239b8143dd0517ef81755eff97
http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_amd64.deb
Size/MD5 checksum: 178162 0ea3330f941cc695b9a1e2095cb0c23e
arm architecture (ARM)
http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_arm.deb
Size/M
参考网址
来源: www.nlnetlabs.nl
链接:http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html
来源: bugs.debian.org
链接:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529420
来源: bugs.debian.org
链接:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529418
来源: MLIST
名称: [oss-security] 20090519 CVE id request: nsd
链接:http://www.openwall.com/lists/oss-security/2009/05/19/1
受影响实体
- Nlnetlabs Nsd:2.2.1<!--2000-1-1-->
- Nlnetlabs Nsd:2.1.5<!--2000-1-1-->
- Nlnetlabs Nsd:2.2.0<!--2000-1-1-->
- Nlnetlabs Nsd:2.1.4<!--2000-1-1-->
- Nlnetlabs Nsd:2.1.3<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...