SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   BIND Vendors:   ISC (Internet Software Consortium)
(NetBSD Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
SecurityTracker Alert ID:  1028854
SecurityTracker URL:  http://securitytracker.com/id/1028854
CVE Reference:   CVE-2013-4854   (Links to External Site)
Date:  Jul 31 2013
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to versions 9.8.5-P2, 9.9.3-P2, 9.9.3-S1-P1
Description:   A vulnerability was reported in ISC BIND. A remote user can cause denial of service conditions.

A remote user can send a query containing specially crafted rdata to cause the target service to crash.

This vulnerability is being actively exploited.

Both authoritative and recursive servers are affected.

BIND 9.6 and BIND 9.6-ESV are not affected.

Impact:   A remote user can cause the target service to crash.
Solution:   NetBSD has issued a fix.

The NetBSD advisory is available at:

http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2013-005.txt.asc

Vendor URL:  kb.isc.org/article/AA-01015 (Links to External Site)
Cause:   State error
Underlying OS:  UNIX (NetBSD)
Underlying OS Comments:  5.1, 5.2, 6.0, 6.1

Message History:   This archive entry is a follow-up to the message listed below.
Jul 26 2013 ISC BIND RDATA Processing Bug Lets Remote Users Deny Service



 Source Message Contents

Subject:  NetBSD Security Advisory 2013-005: bind Denial of Service (CVE-2013-4854)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

		NetBSD Security Advisory 2013-005
		=================================

Topic:		bind Denial of Service (CVE-2013-4854)


Version:	NetBSD-current:		source prior to July 28th, 2013
		NetBSD 6.1:		affected
		NetBSD 6.0:		affected
		NetBSD 5.2:		affected
		NetBSD 5.1:		affected

Severity:	Denial of Service

Fixed:		NetBSD-current:		July 27th, 2013
		NetBSD-6-0 branch:	July 29th, 2013
		NetBSD-6-1 branch:	July 29th, 2013
		NetBSD-6 branch:	July 29th, 2013
		NetBSD-5-2 branch:	July 29th, 2013
		NetBSD-5-1 branch:	July 29th, 2013
		NetBSD-5 branch:	July 29th, 2013

Please note that NetBSD releases prior to 5.1 are no longer supported.
It is recommended that all users upgrade to a supported release.


Abstract
========

A specially crafted query that includes malformed rdata can cause
named to terminate with an assertion failure while rejecting
the malformed query.

This vulnerability has been assigned CVE-2013-4854.


Technical Details
=================

Authoritative and recursive servers are equally vulnerable.
Intentional exploitation of this condition can cause a
denial of service in nameservers running affected versions
of BIND 9.  BIND Access Control Lists do not provide any
protection from malicious clients.

In addition to the named server, applications built using
libdns from the affected source distributions may crash
with assertion failures triggered in the same fashion.



Solutions and Workarounds
=========================

If feasible, as a workaround, restrict access to the nameserver
to only trusted clients via a packet filter.

Solutions:
- - Install and use a bind package from pkgsrc.

- - Update libdns from a daily build later than the fix date: fetch from
  http://nyftp.NetBSD.org/pub/NetBSD-daily/<branch>/<date>/<arch>/
  the file binary/sets/base.tgz

  for NetBSD 5.x:
  cd / && tar xzpf <base.tgz-path> ./usr/lib/libdns.so.1.4
  if your arch has 32bit-compat, update the compat lib as well,
  e.g. for amd64:
  cd / && tar xzpf <base.tgz-path> ./usr/lib/i386/libdns.so.1.4

  for NetBSD 6.x:
  cd / && tar xzpf <base.tgz-path> ./usr/lib/libdns.so.5.8
  if your arch has 32bit-compat, update the compat lib as well,
  e.g. for amd64:
  cd / && tar xzpf <base.tgz-path> ./usr/lib/i386/libdns.so.5.8

- - Rebuild your system with the fixes applied.

The wrong bounds checking is in bind's lib/dns/rdata/generic/keydata_65533.c
Fixed versions:
current:
src/external/bsd/bind/dist/lib/dns/rdata/generic/keydata_65533.c 1.6
netbsd-6:
src/external/bsd/bind/dist/lib/dns/rdata/generic/keydata_65533.c 1.3.4.2
netbsd-6-1:
src/external/bsd/bind/dist/lib/dns/rdata/generic/keydata_65533.c 1.3.4.1.6.1
netbsd-6-0:
src/external/bsd/bind/dist/lib/dns/rdata/generic/keydata_65533.c 1.3.4.1.4.1
netbsd-5:
src/dist/bind/lib/dns/rdata/generic/keydata_65533.c 1.1.2.4
netbsd-5-2:
src/dist/bind/lib/dns/rdata/generic/keydata_65533.c 1.1.2.3.2.1
netbsd-5-1:
src/dist/bind/lib/dns/rdata/generic/keydata_65533.c 1.1.4.5


Thanks To
=========

Thanks to Maxim Shudrak and the HP Zero Day Initiative for
reporting this issue and the ISC security team for their
advisory (https://kb.isc.org/article/AA-01015).


Revision History
================

	2013-07-30	Initial release


More Information
================

Advisories may be updated as new information becomes available.
The most recent version of this advisory (PGP signed) can be found at 
  http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2013-005.txt.asc

Information about NetBSD and NetBSD security can be found at
http://www.NetBSD.org/ and http://www.NetBSD.org/Security/ .


Copyright 2013, The NetBSD Foundation, Inc.  All Rights Reserved.
Redistribution permitted only in full, unmodified form.

$NetBSD: NetBSD-SA2013-005.txt,v 1.2 2013/07/30 20:44:22 tonnerre Exp $

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=oGEr
-----END PGP SIGNATURE-----
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC