Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2017:1737-1

Опубликовано: 29 июн. 2017
Источник: suse-cvrf

Описание

Security update for bind

This update for bind fixes the following issues:

  • An attacker with the ability to send and receive messages to an authoritative DNS server was able to circumvent TSIG authentication of AXFR requests. A server that relied solely on TSIG keys for protection could be manipulated into (1) providing an AXFR of a zone to an unauthorized recipient and (2) accepting bogus Notify packets. [bsc#1046554, CVE-2017-3142]

  • An attacker who with the ability to send and receive messages to an authoritative DNS server and who had knowledge of a valid TSIG key name for the zone and service being targeted was able to manipulate BIND into accepting an unauthorized dynamic update. [bsc#1046555, CVE-2017-3143]

Список пакетов

SUSE Linux Enterprise Point of Sale 11 SP3
bind-9.9.6P1-0.50.1
bind-chrootenv-9.9.6P1-0.50.1
bind-devel-9.9.6P1-0.50.1
bind-doc-9.9.6P1-0.50.1
bind-libs-9.9.6P1-0.50.1
bind-utils-9.9.6P1-0.50.1
SUSE Linux Enterprise Server 11 SP3-LTSS
bind-9.9.6P1-0.50.1
bind-chrootenv-9.9.6P1-0.50.1
bind-devel-9.9.6P1-0.50.1
bind-doc-9.9.6P1-0.50.1
bind-libs-9.9.6P1-0.50.1
bind-libs-32bit-9.9.6P1-0.50.1
bind-utils-9.9.6P1-0.50.1
SUSE Linux Enterprise Server 11 SP3-TERADATA
bind-9.9.6P1-0.50.1
bind-chrootenv-9.9.6P1-0.50.1
bind-devel-9.9.6P1-0.50.1
bind-doc-9.9.6P1-0.50.1
bind-libs-9.9.6P1-0.50.1
bind-libs-32bit-9.9.6P1-0.50.1
bind-utils-9.9.6P1-0.50.1
SUSE Linux Enterprise Server 11 SP4
bind-9.9.6P1-0.50.1
bind-chrootenv-9.9.6P1-0.50.1
bind-doc-9.9.6P1-0.50.1
bind-libs-9.9.6P1-0.50.1
bind-libs-32bit-9.9.6P1-0.50.1
bind-libs-x86-9.9.6P1-0.50.1
bind-utils-9.9.6P1-0.50.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4
bind-9.9.6P1-0.50.1
bind-chrootenv-9.9.6P1-0.50.1
bind-doc-9.9.6P1-0.50.1
bind-libs-9.9.6P1-0.50.1
bind-libs-32bit-9.9.6P1-0.50.1
bind-libs-x86-9.9.6P1-0.50.1
bind-utils-9.9.6P1-0.50.1
SUSE Linux Enterprise Software Development Kit 11 SP4
bind-devel-9.9.6P1-0.50.1
bind-devel-32bit-9.9.6P1-0.50.1

Описание

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:bind-9.9.6P1-0.50.1
SUSE Linux Enterprise Point of Sale 11 SP3:bind-chrootenv-9.9.6P1-0.50.1
SUSE Linux Enterprise Point of Sale 11 SP3:bind-devel-9.9.6P1-0.50.1
SUSE Linux Enterprise Point of Sale 11 SP3:bind-doc-9.9.6P1-0.50.1

Ссылки

Описание

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:bind-9.9.6P1-0.50.1
SUSE Linux Enterprise Point of Sale 11 SP3:bind-chrootenv-9.9.6P1-0.50.1
SUSE Linux Enterprise Point of Sale 11 SP3:bind-devel-9.9.6P1-0.50.1
SUSE Linux Enterprise Point of Sale 11 SP3:bind-doc-9.9.6P1-0.50.1

Ссылки