vuln-list-alt/oval/c10f1/ALT-PU-2020-2651/definitions.json
2024-06-28 13:17:52 +00:00

177 lines
8.1 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202651",
"Version": "oval:org.altlinux.errata:def:20202651",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2651: package `bind` update to version 9.11.22-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2651",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2651",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-01693",
"RefURL": "https://bdu.fstec.ru/vul/2021-01693",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01725",
"RefURL": "https://bdu.fstec.ru/vul/2021-01725",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01726",
"RefURL": "https://bdu.fstec.ru/vul/2021-01726",
"Source": "BDU"
},
{
"RefID": "CVE-2020-8622",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8622",
"Source": "CVE"
},
{
"RefID": "CVE-2020-8623",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8623",
"Source": "CVE"
},
{
"RefID": "CVE-2020-8624",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8624",
"Source": "CVE"
}
],
"Description": "This update upgrades bind to version 9.11.22-alt1. \nSecurity Fix(es):\n\n * BDU:2021-01693: Уязвимость реализации сборки DNS-сервера с опцией «--enable-native-pkcs11» Bind9, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01725: Уязвимость пакета создающий DNS-сервер Bind9, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01726: Уязвимость пакета DNS-сервера Bind9, связанная с ошибками при обработке правил «update-policy» типа «subdomain», позволяющая нарушителю обновлять все части DNS-зоны вместе с тем поддоменом, обновление которого запланировано\n\n * CVE-2020-8622: In BIND 9.0.0 -\u003e 9.11.21, 9.12.0 -\u003e 9.16.5, 9.17.0 -\u003e 9.17.3, also affects 9.9.3-S1 -\u003e 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.\n\n * CVE-2020-8623: In BIND 9.10.0 -\u003e 9.11.21, 9.12.0 -\u003e 9.16.5, 9.17.0 -\u003e 9.17.3, also affects 9.10.5-S1 -\u003e 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with \"--enable-native-pkcs11\" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker\n\n * CVE-2020-8624: In BIND 9.9.12 -\u003e 9.9.13, 9.10.7 -\u003e 9.10.8, 9.11.3 -\u003e 9.11.21, 9.12.1 -\u003e 9.16.5, 9.17.0 -\u003e 9.17.3, also affects 9.9.12-S1 -\u003e 9.9.13-S1, 9.11.3-S1 -\u003e 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-08-21"
},
"Updated": {
"Date": "2020-08-21"
},
"BDUs": [
{
"ID": "BDU:2021-01693",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-269",
"Href": "https://bdu.fstec.ru/vul/2021-01693",
"Impact": "Low",
"Public": "20200820"
},
{
"ID": "BDU:2021-01725",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-617",
"Href": "https://bdu.fstec.ru/vul/2021-01725",
"Impact": "Low",
"Public": "20200820"
},
{
"ID": "BDU:2021-01726",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-269",
"Href": "https://bdu.fstec.ru/vul/2021-01726",
"Impact": "Low",
"Public": "20200820"
}
],
"CVEs": [
{
"ID": "CVE-2020-8622",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-617",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8622",
"Impact": "Low",
"Public": "20200821"
},
{
"ID": "CVE-2020-8623",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-617",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8623",
"Impact": "High",
"Public": "20200821"
},
{
"ID": "CVE-2020-8624",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8624",
"Impact": "Low",
"Public": "20200821"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202651001",
"Comment": "bind is earlier than 0:9.11.22-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202651002",
"Comment": "bind-devel is earlier than 0:9.11.22-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202651003",
"Comment": "bind-doc is earlier than 0:9.11.22-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202651004",
"Comment": "bind-utils is earlier than 0:9.11.22-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202651005",
"Comment": "libbind is earlier than 0:9.11.22-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202651006",
"Comment": "lwresd is earlier than 0:9.11.22-alt1"
}
]
}
]
}
}
]
}