📄 deb_196_1.nasl
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 196-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(53584); script_cve_id("CVE-2002-1219", "CVE-2002-1220", "CVE-2002-1221"); script_version ("$"); name["english"] = "Debian Security Advisory DSA 196-1 (bind)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to bindannounced via advisory DSA 196-1.[Bind version 9, the bind9 package, is not affected by these problems.]ISS X-Force has discovered several serious vulnerabilities in the BerkeleyInternet Name Domain Server (BIND). BIND is the most common implementationof the DNS (Domain Name Service) protocol, which is used on the vastmajority of DNS servers on the Internet. DNS is a vital Internet protocolthat maintains a database of easy-to-remember domain names (host names) andtheir corresponding numerical IP addresses.Circumstancial evidence suggests that the Internet Software Consortium(ISC), maintainers of BIND, was made aware of these issues in mid-October.Distributors of Open Source operating systems, including Debian, werenotified of these vulnerabilities via CERT about 12 hours before the releaseof the advisories on November 12th. This notification did not include anydetails that allowed us to identify the vulnerable code, much less preparetimely fixes.Unfortunately ISS and the ISC released their security advisories with onlydescriptions of the vulnerabilities, without any patches. Even though therewere no signs that these exploits are known to the black-hat community, andthere were no reports of active attacks, such attacks could have beendeveloped in the meantime - with no fixes available.We can all express our regret at the inability of the ironically namedInternet Software Consortium to work with the Internet community in handlingthis problem. Hopefully this will not become a model for dealing withsecurity issues in the future.The Common Vulnerabilities and Exposures (CVE) project identified thefollowing vulnerabilities:1. CVE-2002-1219: A buffer overflow in BIND 8 versions 8.3.3 and earlierallows a remote attacker to execute arbitrary code via a certain DNSserver response containing SIG resource records (RR). This bufferoverflow can be exploited to obtain access to the victim host under theaccount the named process is running with, usually root.2. CVE-2002-1220: BIND 8 versions 8.3.x through 8.3.3 allows a remoteattacker to cause a denial of service (termination due to assertionfailure) via a request for a subdomain that does not exist, with an OPTresource record with a large UDP payload size.3. CVE-2002-1221: BIND 8 versions 8.x through 8.3.3 allows a remote attackerto cause a denial of service (crash) via SIG RR elements with invalidexpiry times, which are removed from the internal BIND database and latercause a null dereference.These problems have been fixed in version 8.3.3-2.0woody1 for the currentstable distribution (woody), in 8.2.3-0.potato.3 for the previous stabledistribution (potato) and in version 8.3.3-3 for the unstable distribution(sid). The fixed packages for unstable will enter the archive today.We recommend that you upgrade your bind package immediately, update toSolution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20196-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 196-1 (bind)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"task-dns-server", ver:"8.2.3-0.potato.3", rls:"DEB2.2")) { vuln = 1;}if(isdpkgvuln(pkg:"bind-doc", ver:"8.2.3-0.potato.3", rls:"DEB2.2")) { vuln = 1;}if(isdpkgvuln(pkg:"bind-dev", ver:"8.2.3-0.potato.3", rls:"DEB2.2")) { vuln = 1;}if(isdpkgvuln(pkg:"bind", ver:"8.2.3-0.potato.3", rls:"DEB2.2")) { vuln = 1;}if(isdpkgvuln(pkg:"dnsutils", ver:"8.2.3-0.potato.3", rls:"DEB2.2")) { vuln = 1;}if(isdpkgvuln(pkg:"bind-doc", ver:"8.3.3-2.0woody1", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"bind-dev", ver:"8.3.3-2.0woody1", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"bind", ver:"8.3.3-2.0woody1", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"dnsutils", ver:"8.2.3-0.potato.3", rls:"DEB3.0")) { vuln = 1;}if(vuln) { security_hole(0);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -