Synopsis
The remote Debian host is missing one or more security-related updates.
Description
The remote Debian 12 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-5633 advisory.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5633-1 [email protected] https://www.debian.org/security/ Moritz Muehlenhoff February 27, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : knot-resolver CVE ID : CVE-2023-46317 CVE-2023-50387 CVE-2023-50868
It was discovered that malformed DNSSEC records within a DNS zone could result in denial of service against Knot Resolver, a caching, DNSSEC- validating DNS resolver.
For the stable distribution (bookworm), these problems have been fixed in version 5.6.0-1+deb12u1.
We recommend that you upgrade your knot-resolver packages.
For the detailed security status of knot-resolver please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/knot-resolver
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmXeVDMACgkQEMKTtsN8 TjZ+PA//danYWvHrMi+Bo5EZHFBRrUHi6lCIE3jW/Nt+qEkZdJ17QV2rvGoiTtrx JQmt8PjlJxMG28Vyw6O8SIOzLgKivqR2FazvQ9XWFm+8VEAfB+mWjYjyQAgJ/T9C RPoo1lbrc6NFgZzBtz3gTN7H/Q0sdSWWTATvCAJfGXujToMA3oJjrNvidla8prE3 zkMSGHvZyaP21iyn7cPmE9VOK628R13VOo6gKne+Wf9NDqJ7MnwE1lBFjqo7E/ah soWDGPYNe2MxNi5S76XINU7NRDyibDCN+vmF6KPb66cBN5HkChlEFejd/5qsCjWq IMWMrfYNvcttvTkx73D7jVHKEkV/EaxoNVVXvzeSTGdsjvt/1ySQrK3uhWrpFQ4a 72B5Oxtuk6NRCjFV9rJkoTfZ1SCpms+OVoG4nwVHxGfZGZefJ5O7u2q9r2r4HD4d 5Bv+F+d+ey9ZCtHN2qL9AfBWapxdsGLAnb8r5Sp9HQQtMsm2o2XDD6dvJ/TF8g6k ukROl796cUPU5j1mR+/voPBaMhZoLDpFtBCmmQ0it+bDrIBYUxxkgZHG/h/M25sc GYwB4hzob1psHZvvuUAtT+l6+/WHTlKqTmOVgJ0/J3f+RKtihK5obqGS3VYXHsCe tlWG79kejlzm6HlIISRANCZ6AtcpR1Ao3GBXYPnwL3xs4R7qvLU= =QRSI
-----END PGP SIGNATURE-----
Tenable has extracted the preceding description block directly from the Debian security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade the knot-resolver packages.
Plugin Details
File Name: debian_DSA-5633.nasl
Agent: unix
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Vulnerability Information
CPE: p-cpe:/a:debian:debian_linux:knot-resolver-module-http, cpe:/o:debian:debian_linux:12.0, p-cpe:/a:debian:debian_linux:knot-resolver-doc, p-cpe:/a:debian:debian_linux:knot-resolver
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Ease: No known exploits are available
Patch Publication Date: 2/27/2024
Vulnerability Publication Date: 10/22/2023