MoinQ:

DNS/BIND/bugについて、ここに記述してください。

http://www.isc.org/software/bind/security/matrix /security_matrix ftp://ftp.isc.org/isc/bind9/

Kaminsky bug: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447

http://www.cvedetails.com/vulnerability-list/vendor_id-64/product_id-144/version_id-71685/ISC-Bind-9.5.0-p1.htm

<       --- 9.5.0-P1 released ---
< 
< 2375.   [security]      Fully randomize UDP query ports to improve
<                       forgery resilience. [RT #17949]
< 

その後: まともな対策はされなかったらしい。 (問題点を理解していなかったのか。)

3       CVE-2009-4022                           2009-11-25      2011-07-18      
2.6
        None    Remote  High    Not required    None    Partial         None
Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438. 

こう書いているということは、キャッシュ毒盛攻撃はport randomizationで十分対応できていると考えてもよさそうだ。 -- ToshinoriMaeno 2011-08-14 14:11:09

https://www.scmagazineus.com/new-bind-9-dns-flaw-is-worse-than-kaminskys/article/140872/

<< <  2024 / 12 >  >>
Mon Tue Wed Thu Fri Sat Sun
            1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31          

http://jprs.jp/tech/security/2011-07-05-bind9-vuln-remote-packet-auth-and-recurse.html

http://jprs.jp/tech/security/2011-07-05-bind98-vuln-rpz-dname.html

5月末にもなにかあったが。


https://lists.isc.org/pipermail/bind-announce/2011-March/000685.html