【TWCERT/CC安全通報】TW-CA-2005-043-[RHSA-2005:212-01: Moderate:

看板NetSecurity (資安 資訊安全)作者時間20年前 (2005/04/16 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
※ 本文轉錄自 [Lan] 信箱 作者: twcert@cert.org.tw (TWCERT/CC Fellows) 標題: 【TWCERT/CC安全通報】TW-CA-2005-04 時間: Fri Apr 15 16:11:05 2005 -----BEGIN PGP SIGNED MESSAGE----- TW-CA-2005-043-[RHSA-2005:212-01: Moderate: dhcp security update] ──────────────────────────────────────── TWCERT/CC發布日期:2005-04-15 原漏洞發布日期:2005-04-12 原漏洞最新更新日期:-- 通用安全漏洞編號:CAN-2004-1006 分類:Dos,Gain Privilege 來源參考:RHSA-2005:212-01 ──── 簡述 ───────────────────────────────── 更新 Red Hat Enterprise Linux 2.1 的 dhcp 套件,修正一個字串格式問題。 Red Hat Security Response Team 將此列為中度的安全更新。 ──── 說明 ───────────────────────────────── dhcp 套件提供 ISC 動態主機規劃配置協定(DHCP)伺服器的功能,另外 dhcpd 也是個轉 發的媒介。DHCP 是個讓設備可從伺服器端取得網路設定資訊的協定。 在 dhcpd 日誌錯誤訊息中發現一個錯誤。惡意的 DNS 伺服器可以傳送一個精心設計的 DNS 轉送要求,導致 dhcpd 癱瘓或執行任意程式碼。CVE (cve.mitre.org) 已將此問題命名為 CAN-2005-0446。 建議 dhcpd 使用者更新此勘誤套件,內含修補檔案,可防止使用者受這些弱點影響。 ──── 影響平台 ─────────────────────────────── ‧Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 ‧Red Hat Linux Advanced Workstation 2.1 - ia64 ‧Red Hat Enterprise Linux ES version 2.1 - i386 ──── 修正方式 ─────────────────────────────── 在安裝更新之前,確定已安裝之前所有跟系統相關的錯誤修正。使用 Red Hat Network 來 下載及更新套件,輸入以下指令啟動 Red Hat Update Agent: up2date 若要獲得更多手動安裝套件的資訊,請參閱下面網址,尋求適合您系統的指引手冊: http://www.redhat.com/docs/manuals/enterprise/ Bug IDs fixed(詳見 http://bugzilla.redhat.com/): 149513 - CAN-2004-1006 dhcp 字串格式問題 RPM 需求: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/dhcp-2.0pl5-9.src.rpm 927826387feaf4ae2adde7202a94379e dhcp-2.0pl5-9.src.rpm i386: 0eb5f32af8caf92da9b1b9cb9a06d690 dhcp-2.0pl5-9.i386.rpm ia64: aea9d86d108f3e113816073c60cf9d67 dhcp-2.0pl5-9.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/dhcp-2.0pl5-9.src.rpm 927826387feaf4ae2adde7202a94379e dhcp-2.0pl5-9.src.rpm ia64: aea9d86d108f3e113816073c60cf9d67 dhcp-2.0pl5-9.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/dhcp-2.0pl5-9.src.rpm 927826387feaf4ae2adde7202a94379e dhcp-2.0pl5-9.src.rpm i386: 0eb5f32af8caf92da9b1b9cb9a06d690 dhcp-2.0pl5-9.i386.rpm 這些套件基於安全理由,均由 Red Hat 公司使用 GPG 簽章,可至下列網址取得 key: https://www.redhat.com/security/team/key.html#package ──── 影響結果 ─────────────────────────────── ──── 聯絡TWCERT/CC ───────────────────────────── Tel: 886-7-5250211 FAX: 886-7-5250212 886-2-23563303 886-2-23924082 Email: twcert@cert.org.tw URL: http://www.cert.org.tw/ PGP key: http://www.cert.org.tw/eng/pgp.htm ──────────────────────────────────────── 附件:[Moderate: dhcp security update] ──── 原文 ───────────────────────────────── - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: dhcp security update Advisory ID: RHSA-2005:212-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-212.html Issue date: 2005-04-12 Updated on: 2005-04-12 Product: Red Hat Enterprise Linux CVE Names: CAN-2004-1006 - - --------------------------------------------------------------------- 1. Summary: An updated dhcp package that fixes a string format issue is now available for Red Hat Enterprise Linux 2.1. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 3. Problem description: The dhcp package provides the ISC Dynamic Host Configuration Protocol (DHCP) server and relay agent, dhcpd. DHCP is a protocol that allows devices to get their own network configuration information from a server. A bug was found in the way dhcpd logs error messages. A malicious DNS server could send a carefully crafted DNS reply and cause dhcpd to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0446 to this issue. All users of dhcp should upgrade to this updated package, which contains a backported patch and is not vulnerable to this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/): 149513 - CAN-2004-1006 dhcp string format issue 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/dhcp-2.0pl5-9.src.rpm 927826387feaf4ae2adde7202a94379e dhcp-2.0pl5-9.src.rpm i386: 0eb5f32af8caf92da9b1b9cb9a06d690 dhcp-2.0pl5-9.i386.rpm ia64: aea9d86d108f3e113816073c60cf9d67 dhcp-2.0pl5-9.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/dhcp-2.0pl5-9.src.rpm 927826387feaf4ae2adde7202a94379e dhcp-2.0pl5-9.src.rpm ia64: aea9d86d108f3e113816073c60cf9d67 dhcp-2.0pl5-9.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/dhcp-2.0pl5-9.src.rpm 927826387feaf4ae2adde7202a94379e dhcp-2.0pl5-9.src.rpm i386: 0eb5f32af8caf92da9b1b9cb9a06d690 dhcp-2.0pl5-9.i386.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1006 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ ──────────────────────────────────────── -----BEGIN PGP SIGNATURE----- Version: PGP 7.0.4 iQEVAwUBQl92WKcyQYefg2/NAQFB+wf/Q2XWyjxRAABsts2QbaCgeMLn2Z7NJm9p Sl9oDj5tqr+OXT2UVN/tsFHO7o9SRZt592GZ17h7PsThAF825rGcdQAVdi5+9Uv2 /WWi3uJRscvszc3AwD8pBJztSB7n1yq9aoSNNTwp0Veo2XUJnqsVfyaqaXrCrqLg NUawPLn/vPjBC+Ohzon12OJj7rCiI1Nre5G94cMsFDow6pi11x+TA6OPgcidabpi LZP9jAlgFnRuVcwIxWN3a3BpzUkyZTyjmOF1qIgMXJyxGgqHMmc2y/XB9uyu3kqu DdikRj6I/wvptLgeQQ6attKGOBw2YNnVWIp4o5JIfNlY4fw0MEEU+g== =Mggs -----END PGP SIGNATURE----- -- Taiwan Computer Emergency Response Team Security Advisory mailing list. Mail to : Majordomo@cert.org.tw and include a line "subscribe advisory". Please visit http://www.cert.org.tw/. PGP key : http://www.cert.org.tw/eng/pgp.htm
文章代碼(AID): #12O06300 (NetSecurity)
文章代碼(AID): #12O06300 (NetSecurity)