NewStart CGSL CORE 5.05 / MAIN 5.05 : bind Multiple Vulnerabilities (NS-SA-2021-0153)

medium Nessus Plugin ID 154490

Synopsis

The remote NewStart CGSL host is affected by multiple vulnerabilities.

Description

The remote NewStart CGSL host, running version CORE 5.05 / MAIN 5.05, has bind packages installed that are affected by multiple vulnerabilities:

- In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
(CVE-2020-8622)

- In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with
--enable-native-pkcs11 * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker (CVE-2020-8623)

- In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone. (CVE-2020-8624)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade the vulnerable CGSL bind packages. Note that updated packages may not be available yet. Please contact ZTE for more information.

See Also

http://security.gd-linux.com/notice/NS-SA-2021-0153

http://security.gd-linux.com/info/CVE-2020-8622

http://security.gd-linux.com/info/CVE-2020-8623

http://security.gd-linux.com/info/CVE-2020-8624

Plugin Details

Severity: Medium

ID: 154490

File Name: newstart_cgsl_NS-SA-2021-0153_bind.nasl

Version: 1.2

Type: local

Published: 10/27/2021

Updated: 10/27/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N

CVSS Score Source: CVE-2020-8624

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:zte:cgsl_core:bind-sdb, p-cpe:/a:zte:cgsl_main:bind-libs, p-cpe:/a:zte:cgsl_main:bind-sdb, cpe:/o:zte:cgsl_main:5, p-cpe:/a:zte:cgsl_core:bind-utils, cpe:/o:zte:cgsl_core:5, p-cpe:/a:zte:cgsl_main:bind-chroot, p-cpe:/a:zte:cgsl_core:bind-pkcs11-devel, p-cpe:/a:zte:cgsl_main:bind-utils, p-cpe:/a:zte:cgsl_core:bind-chroot, p-cpe:/a:zte:cgsl_main:bind-libs-lite, p-cpe:/a:zte:cgsl_main:bind-export-libs, p-cpe:/a:zte:cgsl_main:bind-license, p-cpe:/a:zte:cgsl_main:bind-pkcs11-devel, p-cpe:/a:zte:cgsl_core:bind-pkcs11, p-cpe:/a:zte:cgsl_core:bind-devel, p-cpe:/a:zte:cgsl_core:bind-pkcs11-utils, p-cpe:/a:zte:cgsl_core:bind-export-libs, p-cpe:/a:zte:cgsl_main:bind, p-cpe:/a:zte:cgsl_main:bind-export-devel, p-cpe:/a:zte:cgsl_main:bind-pkcs11, p-cpe:/a:zte:cgsl_main:bind-devel, p-cpe:/a:zte:cgsl_main:bind-sdb-chroot, p-cpe:/a:zte:cgsl_core:bind-pkcs11-libs, p-cpe:/a:zte:cgsl_main:bind-pkcs11-utils, p-cpe:/a:zte:cgsl_core:bind-libs, p-cpe:/a:zte:cgsl_core:bind, p-cpe:/a:zte:cgsl_core:bind-libs-lite, p-cpe:/a:zte:cgsl_core:bind-license, p-cpe:/a:zte:cgsl_core:bind-sdb-chroot, p-cpe:/a:zte:cgsl_core:bind-export-devel, p-cpe:/a:zte:cgsl_main:bind-lite-devel, p-cpe:/a:zte:cgsl_main:bind-pkcs11-libs, p-cpe:/a:zte:cgsl_core:bind-lite-devel

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/24/2021

Vulnerability Publication Date: 8/20/2020

Reference Information

CVE: CVE-2020-8622, CVE-2020-8623, CVE-2020-8624

IAVA: 2020-A-0385-S