isc bind 未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出)

admin 2023-12-01 16:11:28 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
低危 isc bind 未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出)

CVE编号

CVE-2020-8625

利用情况

EXP 已公开

补丁情况

官方补丁

披露时间

2021-02-18
漏洞描述
BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
http://www.openwall.com/lists/oss-security/2021/02/19/1
http://www.openwall.com/lists/oss-security/2021/02/20/2
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://kb.isc.org/v1/docs/cve-2020-8625
https://lists.debian.org/debian-lts-announce/2021/02/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://security.netapp.com/advisory/ntap-20210319-0001/
https://www.debian.org/security/2021/dsa-4857
https://www.zerodayinitiative.com/advisories/ZDI-21-195/
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 isc bind * From (including) 9.12.0 Up to (including) 9.16.11
运行在以下环境
应用 isc bind * From (including) 9.5.0 Up to (including) 9.11.27
运行在以下环境
应用 isc bind 9.11.21 -
运行在以下环境
应用 isc bind 9.11.27 -
运行在以下环境
应用 isc bind 9.11.3 -
运行在以下环境
应用 isc bind 9.11.5 -
运行在以下环境
应用 isc bind 9.11.6 -
运行在以下环境
应用 isc bind 9.11.7 -
运行在以下环境
应用 isc bind 9.11.8 -
运行在以下环境
应用 isc bind 9.16.11 -
运行在以下环境
应用 isc bind 9.16.8 -
运行在以下环境
应用 isc bind 9.17.0 -
运行在以下环境
应用 isc bind 9.17.1 -
运行在以下环境
系统 alibaba_cloud_linux_2.1903 bind-pkcs11 * Up to (excluding) 9.11.4-26.P2.1.al7.4
运行在以下环境
系统 alpine_3.10 bind * Up to (excluding) 9.16.11-r2
运行在以下环境
系统 alpine_3.11 bind * Up to (excluding) 9.16.11-r2
运行在以下环境
系统 alpine_3.12 bind * Up to (excluding) 9.16.11-r2
运行在以下环境
系统 alpine_3.13 bind * Up to (excluding) 9.16.11-r2
运行在以下环境
系统 alpine_3.14 bind * Up to (excluding) 9.16.11-r2
运行在以下环境
系统 alpine_3.15 bind * Up to (excluding) 9.16.11-r2
运行在以下环境
系统 alpine_3.16 bind * Up to (excluding) 9.16.11-r2
运行在以下环境
系统 alpine_3.17 bind * Up to (excluding) 9.16.11-r2
运行在以下环境
系统 alpine_3.18 bind * Up to (excluding) 9.16.11-r2
运行在以下环境
系统 alpine_edge bind * Up to (excluding) 9.16.11-r2
运行在以下环境
系统 amazon_2 bind * Up to (excluding) 9.11.4-26.P2.amzn2.4
运行在以下环境
系统 amazon_AMI bind * Up to (excluding) 9.8.2-0.68.rc1.86.amzn1
运行在以下环境
系统 anolis_os_7 bind-pkcs11-utils * Up to (excluding) 9.11.4-26
运行在以下环境
系统 anolis_os_8 bind-pkcs11-utils * Up to (excluding) 9.11.36-3
运行在以下环境
系统 anolis_os_8.2 bind-libs-lite * Up to (excluding) 9.11.13-6
运行在以下环境
系统 centos_7 bind * Up to (excluding) 9.11.4-26.P2.el7_9.4
运行在以下环境
系统 centos_8 bind-export-libs * Up to (excluding) 9.11.20-5.el8_3.1
运行在以下环境
系统 debian_10 bind9 * Up to (excluding) 1:9.11.5.P4+dfsg-5.1+deb10u3
运行在以下环境
系统 debian_11 bind9 * Up to (excluding) 1:9.16.12-1
运行在以下环境
系统 debian_12 bind9 * Up to (excluding) 1:9.16.12-1
运行在以下环境
系统 debian_9 bind9 * Up to (excluding) 1:9.10.3.dfsg.P4-12.3+deb9u8
运行在以下环境
系统 debian_sid bind9 * Up to (excluding) 1:9.16.12-1
运行在以下环境
系统 fedora_32 bind-libs-lite-debuginfo * Up to (excluding) 9.11.28-1.fc32
运行在以下环境
系统 fedora_33 bind-libs-lite-debuginfo * Up to (excluding) 9.11.28-1.fc33
运行在以下环境
系统 fedora_34 bind-dlz-mysql-debuginfo * Up to (excluding) 9.16.11-5.fc34
运行在以下环境
系统 kylinos_aarch64_V10 bind * Up to (excluding) 9.11.4-26.P2.el7_9.7
运行在以下环境
系统 kylinos_aarch64_V10SP1 bind * Up to (excluding) 9.11.21-8.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP2 bind * Up to (excluding) 9.11.21-9.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP1 bind * Up to (excluding) 9.11.21-8.a.ky10
运行在以下环境
系统 kylinos_x86_64_V10 bind * Up to (excluding) 9.11.4-26.P2.el7_9.7
运行在以下环境
系统 kylinos_x86_64_V10SP1 bind * Up to (excluding) 9.11.21-8.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 bind * Up to (excluding) 9.11.21-9.ky10
运行在以下环境
系统 opensuse_Leap_15.2 libbind9-1600-32bit * Up to (excluding) 9.16.6-lp152.14.12.1
运行在以下环境
系统 oracle_6 oraclelinux-release * Up to (excluding) 9.8.2-0.68.rc1.0.1.el6_10.8
运行在以下环境
系统 oracle_7 oraclelinux-release * Up to (excluding) 9.11.4-26.P2.el7_9.4
运行在以下环境
系统 oracle_8 oraclelinux-release * Up to (excluding) 9.11.20-5.el8_3.1
运行在以下环境
系统 redhat_6 bind * Up to (excluding) 32:9.8.2-0.68.rc1.el6_10.10
运行在以下环境
系统 redhat_7 bind * Up to (excluding) 9.11.4-26.P2.el7_9.4
运行在以下环境
系统 redhat_8 bind-export-libs * Up to (excluding) 9.11.20-5.el8_3.1
运行在以下环境
系统 suse_12_SP5 bind-doc * Up to (excluding) 9.11.22-3.29.1
运行在以下环境
系统 ubuntu_16.04 bind9 * Up to (excluding) 1:9.10.3.dfsg.P4-8ubuntu1.18
运行在以下环境
系统 ubuntu_16.04.7_lts bind9 * Up to (excluding) 1:9.10.3.dfsg.P4-8ubuntu1.18
运行在以下环境
系统 ubuntu_18.04 bind9 * Up to (excluding) 1:9.11.3+dfsg-1ubuntu1.14
运行在以下环境
系统 ubuntu_18.04.5_lts bind9 * Up to (excluding) 1:9.11.3+dfsg-1ubuntu1.14
运行在以下环境
系统 ubuntu_20.04 bind9 * Up to (excluding) 1:9.16.1-0ubuntu2.6
阿里云评分 3.6
  • 攻击路径 远程
  • 攻击复杂度 复杂
  • 权限要求 普通权限
  • 影响范围 有限影响
  • EXP成熟度 EXP 已公开
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-120 未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0