D&C Lug - Home Page
Devon & Cornwall Linux Users' Group

[ Date Index ][ Thread Index ]
[ <= Previous by date / thread ] [ Next by date / thread => ]

[LUG] Fwd: CERT Advisory CA-2002-15 Denial-of-Service Vulnerability in ISC BIND 9



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


woooooo!

*whistles* ;))

~ Theo, the BIND hater extraordinare ;)

- ----------  Forwarded Message  ----------

Subject: CERT Advisory CA-2002-15 Denial-of-Service Vulnerability in ISC BIND 
9
Date: Tuesday 04 June 2002 9:40 pm
From: CERT Advisory <cert-advisory@xxxxxxxx>
To: cert-advisory@xxxxxxxx

- -----BEGIN PGP SIGNED MESSAGE-----
CERT Advisory CA-2002-15 Denial-of-Service Vulnerability in ISC BIND 9
  Original release date: June 04, 2002
  Last revised: --
  Source: CERT/CC
  A complete revision history can be found at the end of this file.
Systems Affected
    * Domain Name System (DNS) servers running ISC BIND 9 prior to 9.2.1
      Because  the  normal  operation  of  most services on the Internet
      depends  on  the  proper  operation of DNS servers, other services
      could be affected if this vulnerability is exploited.
Overview
  A  denial-of-service vulnerability exists in version 9 of the Internet
  Software  Consortium's  (ISC)  Berkeley  Internet  Name  Domain (BIND)
  server.  ISC  BIND  versions 8 and 4 are not affected. Exploiting this
  vulnerability will cause the BIND server to shut down.
I. Description
  BIND  is  an  implementation  of  the Domain Name System (DNS) that is
  maintained  by  the  ISC.  A vulnerability exists in version 9 of BIND
  that  allows  remote  attackers to shut down BIND servers. An attacker
  can  cause  the  shutdown by sending a specific DNS packet designed to
  trigger  an  internal  consistency  check. However, this vulnerability
  will  not allow an attacker to execute arbitrary code or write data to
  arbitrary locations in memory.
  The  internal consistency check that triggers the shutdown occurs when
  the  rdataset  parameter  to  the  dns_message_findtype()  function in
  message.c  is  not  NULL as expected. The condition causes the code to
  assert an error message and call abort() to shut down the BIND server.
  It  is  also possible to accidentally trigger this vulnerability using
  common   queries   found  in  routine  operation,  especially  queries
  originating from SMTP servers.
  A   vulnerability  note  describing  this  problem  can  be  found  at
  http://www.kb.cert.org/vuls/id/739123.    This    vulnerability   note
  includes  a  list  of  vendors  that  have  been  contacted about this
  vulnerability.
  This vulnerability is also being referenced as CAN-2002-0400:
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0400
II. Impact
  Exploitation of this vulnerability will cause the BIND server to abort
  and  shut  down.  As  a  result, the BIND server will not be available
  unless it is restarted.
III. Solution
Apply a patch from your vendor
  The  ISC  has released BIND version 9.2.1. The CERT/CC recommends that
  users  of  BIND  9  apply a patch from their vendor or upgrade to BIND
  9.2.1.
Appendix A. - Vendor Information
  This  appendix  contains  information  provided  by  vendors  for this
  advisory.  As  vendors  report new information to the CERT/CC, we will
  update this section and note the changes in our revision history. If a
  particular  vendor  is  not  listed  below, we have not received their
  comments.
Apple
    The version of BIND that ships in Mac OS X and Mac OS X Server does
    not contain this vulnerability.
BSDI
    Wind  River  Systems, Inc. does not include BIND 9 with any version
    of BSD/OS.
Caldera
    SCO  OpenServer  from Caldera does not ship BIND9, and is therefore
    not vulnerable.
    Caldera  Open  UNIX  does  ship  BIND9,  and  is vulnerable. We are
    investigating.
    Caldera  OpenLinux  does  not  ship  BIND9,  and  is  therefore not
    vulnerable.
Compaq Computer Corporation
    HP Alpha Server Products:
    HP Tru64 UNIX:
    Tru64  UNIX  is  not  vulnerable to this reported problem. HP Tru64
    UNIX ships with BIND 8.2.2-p5
    TCP/IP for HP OpenVms:
    TCP/IP   for   HP  OpenVms  is  not  vulnerable  to  this  reported
    problem.The  current  versions  of  TCP/IP for HP OpenVMS ship BIND
    8.2.2-p5
    HP NonStop Server:
    "HP  NonStop  Himalaya  is  not  vulnerable  to  this problem.  The
    'named' function of Domain Name Server (T6021) which is implemented
    for  HP  NonStop Himalaya is based on BIND 4.8.  NonStop DNS is the
    only Himalaya software product that includes 'named'."
Cray
    Cray, Inc. is not vulnerable since the BIND distributed with Unicos
    and Unicos/mk is not based on BIND 9.
Engarde
    Guardian  Digital  does  not ship BIND 9 in any versions of EnGarde
    Secure  Linux,  therefore  we are not vulnerable. All versions were
    shipped with BIND 8.
F5 Networks, Inc.
    F5  Networks' products do not include BIND 9, and are therefore not
    affected by this vulnerability.
FreeBSD
    The FreeBSD base system does not ship with ISC BIND 9. However, ISC
    BIND  9  is  available  in  the  FreeBSD  Ports  Collection.  It is
    currently at version 9.2.1 and is therefore unaffected.
Hewlett-Packard Company
    HP is Vulnerable, Solution investigation continuing..
IBM
    After  analysis  of the affected component, IBM has determined that
    the AIX bind deamon is not vulnerable to the attack as described in
    the CERT advisory.
Internet Software Consortium
    This  vulnerability  was found through routine bug analysis. BIND 9
    is  designed  to exit when it detects an internal consistency error
    to reduce the impact of bugs in the server. ISC strongly reccomends
    that  all BIND 9 users upgrade immediately to 9.2.1. BIND 9.2.1 can
    be found at http://www.isc.org/products/BIND/bind9.html.
MandrakeSoft
    Mandrake  Linux  8.x  ships with BIND9 and as such updated packages
    will be available as early as possible.
Microsoft Corporation
    Microsoft  has  reviewed  the  information and can confirm that our
    products are not affected by this vulnerability.
NEC Corporation
    sent on June 3, 2002
    [Server Products]
    * EWS/UP 48 Series operating system
       - is NOT vulnerable.
NetBSD
    NetBSD has not included Bind 9 in the base system of any release or
    -current development branch.
    Bind  9  is  available  from the 3rd party software system, pkgsrc.
    Users  who  have  installed  net/bind9  or net/bind9-current should
    update  to  a  fixed version. pkgsrc/security/audit-packages can be
    used to keep up to date with these types of issues.
Network Appliance
    All  NetApp  products  do  not  contain any BIND code, so no NetApp
    product is vulnerable to this problem.
Nortel Networks Limited
    Nortel  Networks  is  reviewing  its  portfolio to determine if any
    products  are  affected by the vulnerability noted in CERT Advisory
    CA-2002-15. A definitive statement will be issued shortly.
Red Hat
    Red  Hat distributed BIND 9 in Red Hat Linux versions 7.1, 7.2, and
    7.3.  We  are  currently working on producing errata packages, when
    complete these will be available along with our advisory at the URL
    below.   At the same time users of the Red Hat Network will be able
    to update their systems using the 'up2date' tool.
    http://rhn.redhat.com/errata/RHSA-2002-105.html
Silicon Graphics, Inc.
    IRIX does not ship with BIND9 and is not vulnerable.
Sun Microsystems
    Sun  does  not ship BIND 9 with any version of Solaris at this time
    and is therefore not affected by this issue.
SuSE, Inc.
    We  are  affected  by  the  bind9  DoS  issue  as  well. All of our
    currently  supported SuSE Linux products come with a bind9 package.
    We  will  release  an  announcement for the issue, coordinated with
    your timeframe and not before we see your official announcement.
Unisphere Networks, Inc.
    The  Unisphere  Networks  ERX  family  of  edge  routers  does  not
    implement  a  DNS  server  or  named  daemon  within the Unison OS.
    Additionally,  the  DNS client found on the ERX is not based on the
    ISC BIND code. Unisphere Networks has no reason to expect a similar
    problem exists in the DNS client implementation found on the ERX.
    _________________________________________________________________
  The  CERT  Coordination Center thanks the Internet Software Consortium
  for notifying us about this vulnerability.
    _________________________________________________________________
  Author: Ian A. Finlay
  ______________________________________________________________________
  This document is available from:
  http://www.cert.org/advisories/CA-2002-15.html
  ______________________________________________________________________
CERT/CC Contact Information
  Email: cert@xxxxxxxx
         Phone: +1 412-268-7090 (24-hour hotline)
         Fax: +1 412-268-6989
         Postal address:
         CERT Coordination Center
         Software Engineering Institute
         Carnegie Mellon University
         Pittsburgh PA 15213-3890
         U.S.A.
  CERT/CC   personnel   answer  the  hotline  08:00-17:00  EST(GMT-5)  /
  EDT(GMT-4)  Monday  through  Friday;  they are on call for emergencies
  during other hours, on U.S. holidays, and on weekends.
Using encryption
  We  strongly  urge you to encrypt sensitive information sent by email.
  Our public PGP key is available from
  http://www.cert.org/CERT_PGP.key
  If  you  prefer  to  use  DES,  please  call the CERT hotline for more
  information.
Getting security information
  CERT  publications  and  other security information are available from
  our web site
  http://www.cert.org/
  To  subscribe  to  the CERT mailing list for advisories and bulletins,
  send  email  to majordomo@xxxxxxxxx Please include in the body of your
  message
  subscribe cert-advisory
  *  "CERT"  and  "CERT  Coordination Center" are registered in the U.S.
  Patent and Trademark Office.
  ______________________________________________________________________
  NO WARRANTY
  Any  material furnished by Carnegie Mellon University and the Software
  Engineering  Institute  is  furnished  on  an  "as is" basis. Carnegie
  Mellon University makes no warranties of any kind, either expressed or
  implied  as  to  any matter including, but not limited to, warranty of
  fitness  for  a  particular purpose or merchantability, exclusivity or
  results  obtained from use of the material. Carnegie Mellon University
  does  not  make  any warranty of any kind with respect to freedom from
  patent, trademark, or copyright infringement.
    _________________________________________________________________
  Conditions for use, disclaimers, and sponsorship information
  Copyright 2002 Carnegie Mellon University.
  Revision History
June 04, 2002:  Initial release
- -----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8
iQCVAwUBPP0kn6CVPMXQI2HJAQFEyQP/fkgF01EWoE2JPDB3kPwLhSUSrM8XHNvQ
+vfuH8ZSUAiG0/g/zSGjeTt0NFYeeI6kMS7MQqS76ECaP93l7gR/zucShEkOKliy
4NHjoF34gPqPlDu6BAdh2xfl9q+LNdu8EHs8rjl1FqjvPKmL436tS0ToJXqXDpmx
/WHO3P3AwhM=
=M/6l
- -----END PGP SIGNATURE-----

- -------------------------------------------------------

- -- 

Theo Zourzouvillys
http://zozo.org.uk/

You will be given a post of trust and responsibility.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE8/Z6Y448CrwpTn6YRAhDoAKD9G3idItiPATm+G5vY4MyorHJ+vgCgxsT5
E3tSvcXlySRkq4S29rAztVM=
=eC9C
-----END PGP SIGNATURE-----


--
The Mailing List for the Devon & Cornwall LUG
Mail majordomo@xxxxxxxxxxxx with "unsubscribe list" in the
message body to unsubscribe.


Lynx friendly