Emergency bulletin on the risk of serious security vulnerabilities in DNS systems

Source: Internet
Author: User

The intermediary transaction SEO diagnoses Taobao guest stationmaster buys the Cloud host technology Hall

National Computer network Emergency Technology Processing Coordination Center Emergency bulletin on the risk of serious security vulnerabilities for DNS systems:

Security Bulletin: cn-va08-05

Release date: July 24, 2008

Vulnerability Type: Spoofing

Vulnerability Assessment: Important

Security level: Level Three

Exposure: Public

Vulnerability Description:

Since July 9, 2008, Cisco, Microsoft, ISC and other Internet domain name resolution Service software manufacturers have issued a security bulletin, said its DNS software high-risk vulnerabilities, attackers can be guessed in the DNS resolution of the message sequence number to fake DNS authoritative server response, so as to achieve "pollution" cache ( Cache), the error of the domain name to the information injected into the DNS server, resulting in the pollution of the DNS server will provide external error resolution results. This kind of attack can cause the domain name hijacking attack, causes the public without the knowledge domain name to visit the hacker designated website, faces the phishing and the webpage Trojan and so on a series of serious security threats.

July 22, the detection program for the vulnerability was released, July 23, the full attack on the vulnerability was released, and subsequently widely circulated. My center after a preliminary test found that in a good bandwidth, the attack program on the vulnerable DNS server in just a few minutes to complete the attack, the target will be instantaneous access to a large number of attack messages, easy to be mistaken for "query flood" way of denial of service attacks.

In view of the serious situation and rapid development of the security incident, in order to ensure the safe operation of the Internet in China, the relevant units should promptly take appropriate measures to carry out the necessary security strengthening of the DNS server, and to strengthen the abnormal monitoring and disposal.

Recommended measures:

1, according to the corresponding vendor to upgrade the DNS server system;

2, because in the attack process will be short time a large number of forged domain name resolution response packet, render Denial-of-service attack characteristics, these packets source IP, destination IP, resolved IP address the same, but the serial number is different, can be based on conditional protection equipment (such as intelligent firewall, flow cleaning equipment, etc.) The corresponding rules are configured to screen or filter;

3. Periodically clean up the DNS cache or clean up the cache after discovering unusual access.

Reference information:

Http://www.cert.org.cn/servlet/S ... =bulletin&sub=1

http://www.kb.cert.org/vuls/id/800113

http://www.isc.org/sw/bind/bind-security.php

Http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml

Http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx

Additional Information:

CVE Number:

First release date: 2008-7-24

Number of revisions: 0

Security Bulletin Documentation:

cncert/cc

CNCERT/CC to ensure the accuracy and reliability of each announcement before releasing security bulletin information. However, the adoption and implementation of the recommendations in the bulletin is entirely up to the user's own discretion, and its possible problems and results are entirely user-borne. Whether or not to adopt our recommendations depends on the decisions of your individual or your organization, and you should consider whether their content meets the security policies and processes of your individual or your organization.

In any case, if you are confident that your computer system is compromised or attacked, we encourage you to inform the National Computer network Emergency Technology processing Coordination Center in time: http://www.cert.org.cn/servlet/Incident

At the same time, we also encourage all computer and network security research institutes, including manufacturers and research institutes, to report to us the vulnerability information found by your organization. We will verify all vulnerabilities and disclose the vulnerability information on the CNCERT/CC website and instruct the affected users to take action to avoid loss.

If you find any problems with this bulletin, please contact CNCERT/CC: cncert@cert.org.cn

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.