漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
A stack use-after-return flaw in SIG(0) handling code may enable ACL bypass
Vulnerability Description
A use-after-return vulnerability exists in the `named` server when handling DNS queries signed with SIG(0). Using a specially-crafted DNS request, an attacker may be able to cause an ACL to improperly (mis)match an IP address. In a default-allow ACL (denying only specific IP addresses), this may lead to unauthorized access. Default-deny ACLs should fail-secure. This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1. BIND 9 versions 9.18.0 through 9.18.46 and 9.18.11-S1 through 9.18.46-S1 are NOT affected.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Vulnerability Type
返回栈上的变量地址
Vulnerability Title
ISC BIND 9 安全漏洞
Vulnerability Description
ISC BIND 9是ISC组织的一个域名系统软件。 ISC BIND 9 9.20.0至9.20.20版本、9.21.0至9.21.19版本和9.20.9-S1至9.20.20-S1版本存在安全漏洞,该漏洞源于处理使用SIG(0)签名的DNS查询时存在释放后重用,可能导致访问控制列表错误匹配IP地址。
CVSS Information
N/A
Vulnerability Type
N/A