{"id":179,"date":"2015-07-29T09:14:49","date_gmt":"2015-07-29T14:14:49","guid":{"rendered":"https:\/\/10.252.76.154\/?p=179"},"modified":"2015-09-29T16:37:42","modified_gmt":"2015-09-29T21:37:42","slug":"csirt-panama-aviso-2015-07-vulnerabilidad-en-bind-cve-2015-5477","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=179","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2015-07- Vulnerabilidad en BIND (CVE-2015-5477)"},"content":{"rendered":"<p style=\"text-align: justify;\">CSIRT Panam\u00e1 Aviso 2015-07- Vulnerabilidad en BIND (CVE-2015-5477)<br \/>\nGravedad: Alta<br \/>\nFecha de publicaci\u00f3n: Julio 29, 2015<br \/>\nFecha de modificaci\u00f3n: Julio 29, 2015<br \/>\n\u00daltima revisi\u00f3n: Revisi\u00f3n A.<br \/>\nFuente: Avisos de Seguridad de ISC<\/p>\n<p style=\"text-align: justify;\">Sistemas Afectados<\/p>\n<p style=\"text-align: justify;\">Las siguientes versiones de BIND son afectadas por esta vulnerabilidad:<br \/>\n&#8211; 9.1.0 -&gt; 9.8.x<br \/>\n&#8211; 9.9.0 -&gt; 9.9.7-P1<br \/>\n&#8211; 9.10.0 -&gt; 9.10.2-P2<\/p>\n<p style=\"text-align: justify;\">I. Descripci\u00f3n<br \/>\nLa organizaci\u00f3n ISC, (Internet Systems Consortium, por sus siglas en ingl\u00e9s) encargada de dar mantenimiento al software BIND; ha publicado una vulnerabilidad que afecta todas las versiones de BIND 9. Esta vulnerabilidad consiste en un error en el manejo de las consultas tipo TKEY; en donde un atacante podr\u00eda explotar como un vector de un ataque para realizar una negaci\u00f3n de servicio (DoS).<br \/>\nLos servidores recursivos y autoritativos son vulnerables a esta vulnerabilidad, adicionalmente cabe se\u00f1alar que las pol\u00edtcas de acceso u opciones de configuraci\u00f3n como el establecimiento de l\u00edmites de conexi\u00f3n no ayudan a prevenir esta vulnerabilidad. Se recomienda actualizar los mas pronto posible a la versi\u00f3n mas reciente de BIND.<\/p>\n<p style=\"text-align: justify;\">II. Impacto<br \/>\nComplejidad de acceso: Baja<br \/>\nAutenticaci\u00f3n: No requerida para explotarla<br \/>\nTipo de impacto: Compromiso total de la disponibilidad del sistema<\/p>\n<p style=\"text-align: justify;\">III. Referencia a soluciones, herramientas e informaci\u00f3n<br \/>\nhttps:\/\/kb.isc.org\/article\/AA-01272<br \/>\nhttps:\/\/security-tracker.debian.org\/tracker\/CVE-2015-5477<br \/>\nhttps:\/\/bugzilla.redhat.com\/show_bug.cgi?id=CVE-2015-5477<br \/>\nhttp:\/\/www.isc.org\/downloads\/<\/p>\n<p style=\"text-align: justify;\">IV. Informaci\u00f3n de contacto<br \/>\nCSIRT PANAMA<br \/>\nAutoridad Nacional para la Innovaci\u00f3n Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nWeb: https:\/\/www.cert.pa<\/p>\n<p style=\"text-align: justify;\">&#8212;&#8211;BEGIN PGP PUBLIC KEY BLOCK&#8212;&#8211;<br \/>\nVersion: GnuPG v2.0.17 (MingW32)<\/p>\n<p style=\"text-align: justify;\">mQENBE8C9KoBCAClkvrtdD08B1YgIntnK241GmWY7fRWtPn\/QIEG1+TLokEuOhw+<br \/>\nGq\/lK\/4NP9RzqpD57LcRUBiGgTmO\/5C9xkhVmxz2jid0h03fLorC84rAk2pOjr0i<br \/>\npbltETq9RCGhOWp13OV22x2yiIedBi05bzw3F+uLHhn9xKjmpBuZB6WO\/TuD52DH<br \/>\nKRZtwSvoaa61vL0bGnIf3lNGWkALWEC3lGBppby4D05N2FNfgfOFr1yOpxTaRaDh<br \/>\n4kOnoAEWVzppkTPyqSOkwXmgdma8D9yqD41Ffu8ypGTv+OOVO7jDq8tx9wVZEU+w<br \/>\npqBTzQcf0P0K7qO3igdHQxqHmqXsaJpbmvCBABEBAAG0KkNTSVJUIFBhbmFtYSAo<br \/>\nQ1NJUlQgUGFuYW1hKSA8aW5mb0BjZXJ0LnBhPokBOAQTAQIAIgUCTwL0qgIbDwYL<br \/>\nCQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQ2YlXchbysSSPSQgAooUy3qSR\/YX2<br \/>\nH3USJ5VzrmnraHg5LIWRPIBD1PGrswjLE8hxdobPU\/uzi9LWnEcDscfFVKM\/K0Jt<br \/>\nbjeoESqCVFlpE0YXJWdDhy0m2WM410sDE2HVXbPhWGqrNeDb0VUV\/LWag1yYTj5w<br \/>\nkkxma4Tk5TqlhgL5su2PpjtTdFSHYD4N+4mu7g1GhRrrpz+u7ZRm3b\/WkAJg5FIg<br \/>\nU0MpPqUGAF5\/pc02ZB10FdxDwWyXAkwYUN+zfLiKzKOrBGkEw9+jvFGU+z76P9Zk<br \/>\n1XJIexpmkBYTxc+TOclhAp\/3HP4taoBHRMoR1q1YhdC++UgRSLmPLGn\/AB707JzN<br \/>\nQ80++q2kWQ==<br \/>\n=JUYg<br \/>\n&#8212;&#8211;END PGP PUBLIC KEY BLOCK&#8212;&#8211;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2015-07- Vulnerabilidad en BIND (CVE-2015-5477) Gravedad: Alta Fecha de publicaci\u00f3n: Julio 29, 2015 Fecha de modificaci\u00f3n: Julio 29, 2015 \u00daltima revisi\u00f3n: Revisi\u00f3n A. Fuente: Avisos de Seguridad de ISC Sistemas Afectados Las&#8230;<\/p>\n","protected":false},"author":4,"featured_media":295,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[8,25,26],"class_list":["post-179","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-avisos","tag-bind","tag-dns"],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=179"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/179\/revisions"}],"predecessor-version":[{"id":327,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/179\/revisions\/327"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/295"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}