【TWCERT/CC安全通報】TW-CA-2005-043-[RHSA-2005:212-01: Moderate:
※ 本文轉錄自 [Lan] 信箱
作者: twcert@cert.org.tw (TWCERT/CC Fellows)
標題: 【TWCERT/CC安全通報】TW-CA-2005-04
時間: Fri Apr 15 16:11:05 2005
-----BEGIN PGP SIGNED MESSAGE-----
TW-CA-2005-043-[RHSA-2005:212-01: Moderate: dhcp security update]
────────────────────────────────────────
TWCERT/CC發布日期:2005-04-15
原漏洞發布日期:2005-04-12
原漏洞最新更新日期:--
通用安全漏洞編號:CAN-2004-1006
分類:Dos,Gain Privilege
來源參考:RHSA-2005:212-01
──── 簡述 ─────────────────────────────────
更新 Red Hat Enterprise Linux 2.1 的 dhcp 套件,修正一個字串格式問題。
Red Hat Security Response Team 將此列為中度的安全更新。
──── 說明 ─────────────────────────────────
dhcp 套件提供 ISC 動態主機規劃配置協定(DHCP)伺服器的功能,另外 dhcpd 也是個轉
發的媒介。DHCP 是個讓設備可從伺服器端取得網路設定資訊的協定。
在 dhcpd 日誌錯誤訊息中發現一個錯誤。惡意的 DNS 伺服器可以傳送一個精心設計的 DNS
轉送要求,導致 dhcpd 癱瘓或執行任意程式碼。CVE (cve.mitre.org) 已將此問題命名為
CAN-2005-0446。
建議 dhcpd 使用者更新此勘誤套件,內含修補檔案,可防止使用者受這些弱點影響。
──── 影響平台 ───────────────────────────────
‧Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
‧Red Hat Linux Advanced Workstation 2.1 - ia64
‧Red Hat Enterprise Linux ES version 2.1 - i386
──── 修正方式 ───────────────────────────────
在安裝更新之前,確定已安裝之前所有跟系統相關的錯誤修正。使用 Red Hat Network 來
下載及更新套件,輸入以下指令啟動 Red Hat Update Agent:
up2date
若要獲得更多手動安裝套件的資訊,請參閱下面網址,尋求適合您系統的指引手冊:
http://www.redhat.com/docs/manuals/enterprise/
Bug IDs fixed(詳見 http://bugzilla.redhat.com/):
149513 - CAN-2004-1006 dhcp 字串格式問題
RPM 需求:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/dhcp-2.0pl5-9.src.rpm
927826387feaf4ae2adde7202a94379e dhcp-2.0pl5-9.src.rpm
i386:
0eb5f32af8caf92da9b1b9cb9a06d690 dhcp-2.0pl5-9.i386.rpm
ia64:
aea9d86d108f3e113816073c60cf9d67 dhcp-2.0pl5-9.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/dhcp-2.0pl5-9.src.rpm
927826387feaf4ae2adde7202a94379e dhcp-2.0pl5-9.src.rpm
ia64:
aea9d86d108f3e113816073c60cf9d67 dhcp-2.0pl5-9.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/dhcp-2.0pl5-9.src.rpm
927826387feaf4ae2adde7202a94379e dhcp-2.0pl5-9.src.rpm
i386:
0eb5f32af8caf92da9b1b9cb9a06d690 dhcp-2.0pl5-9.i386.rpm
這些套件基於安全理由,均由 Red Hat 公司使用 GPG 簽章,可至下列網址取得 key:
https://www.redhat.com/security/team/key.html#package
──── 影響結果 ───────────────────────────────
──── 聯絡TWCERT/CC ─────────────────────────────
Tel: 886-7-5250211 FAX: 886-7-5250212
886-2-23563303 886-2-23924082
Email: twcert@cert.org.tw
URL: http://www.cert.org.tw/
PGP key: http://www.cert.org.tw/eng/pgp.htm
────────────────────────────────────────
附件:[Moderate: dhcp security update]
──── 原文 ─────────────────────────────────
- - ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Moderate: dhcp security update
Advisory ID: RHSA-2005:212-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-212.html
Issue date: 2005-04-12
Updated on: 2005-04-12
Product: Red Hat Enterprise Linux
CVE Names: CAN-2004-1006
- - ---------------------------------------------------------------------
1. Summary:
An updated dhcp package that fixes a string format issue is now available
for Red Hat Enterprise Linux 2.1.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
3. Problem description:
The dhcp package provides the ISC Dynamic Host Configuration Protocol
(DHCP) server and relay agent, dhcpd. DHCP is a protocol that allows
devices to get their own network configuration information from a server.
A bug was found in the way dhcpd logs error messages. A malicious DNS
server could send a carefully crafted DNS reply and cause dhcpd to crash or
possibly execute arbitrary code. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2005-0446 to this issue.
All users of dhcp should upgrade to this updated package, which contains a
backported patch and is not vulnerable to this issue.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
149513 - CAN-2004-1006 dhcp string format issue
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/dhcp-2.0pl5-9.src.rpm
927826387feaf4ae2adde7202a94379e dhcp-2.0pl5-9.src.rpm
i386:
0eb5f32af8caf92da9b1b9cb9a06d690 dhcp-2.0pl5-9.i386.rpm
ia64:
aea9d86d108f3e113816073c60cf9d67 dhcp-2.0pl5-9.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/dhcp-2.0pl5-9.src.rpm
927826387feaf4ae2adde7202a94379e dhcp-2.0pl5-9.src.rpm
ia64:
aea9d86d108f3e113816073c60cf9d67 dhcp-2.0pl5-9.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/dhcp-2.0pl5-9.src.rpm
927826387feaf4ae2adde7202a94379e dhcp-2.0pl5-9.src.rpm
i386:
0eb5f32af8caf92da9b1b9cb9a06d690 dhcp-2.0pl5-9.i386.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1006
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
────────────────────────────────────────
-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.4
iQEVAwUBQl92WKcyQYefg2/NAQFB+wf/Q2XWyjxRAABsts2QbaCgeMLn2Z7NJm9p
Sl9oDj5tqr+OXT2UVN/tsFHO7o9SRZt592GZ17h7PsThAF825rGcdQAVdi5+9Uv2
/WWi3uJRscvszc3AwD8pBJztSB7n1yq9aoSNNTwp0Veo2XUJnqsVfyaqaXrCrqLg
NUawPLn/vPjBC+Ohzon12OJj7rCiI1Nre5G94cMsFDow6pi11x+TA6OPgcidabpi
LZP9jAlgFnRuVcwIxWN3a3BpzUkyZTyjmOF1qIgMXJyxGgqHMmc2y/XB9uyu3kqu
DdikRj6I/wvptLgeQQ6attKGOBw2YNnVWIp4o5JIfNlY4fw0MEEU+g==
=Mggs
-----END PGP SIGNATURE-----
--
Taiwan Computer Emergency Response Team Security Advisory mailing list.
Mail to : Majordomo@cert.org.tw and include a line "subscribe advisory".
Please visit http://www.cert.org.tw/.
PGP key : http://www.cert.org.tw/eng/pgp.htm
NetSecurity 近期熱門文章
PTT數位生活區 即時熱門文章