8548848 2002-06-04 16:42 -0400 /306 rader/ CERT Advisory <cert-advisory@cert.org>
Sänt av: joel@lysator.liu.se
Importerad: 2002-06-05 01:25 av Brevbäraren
Extern mottagare: cert-advisory@cert.org
Mottagare: Bugtraq (import) <22509>
Mottagare: Bellman -- The Recursive Hacker <18821>
Sänt: 2002-06-05 01:42
Mottaget: 2002-06-05 11:20
Ärende: CERT Advisory CA-2002-15 Denial-of-Service Vulnerability in ISC BIND 9
------------------------------------------------------------
From: CERT Advisory <cert-advisory@cert.org>
To: cert-advisory@cert.org
Message-ID: <CA-2002-15.1@cert.org>
-----BEGIN PGP SIGNED MESSAGE-----
CERT Advisory CA-2002-15 Denial-of-Service Vulnerability in ISC BIND 9
Original release date: June 04, 2002
Last revised: --
Source: CERT/CC
A complete revision history can be found at the end of this file.
Systems Affected
* Domain Name System (DNS) servers running ISC BIND 9 prior to 9.2.1
Because the normal operation of most services on the Internet
depends on the proper operation of DNS servers, other services
could be affected if this vulnerability is exploited.
Overview
A denial-of-service vulnerability exists in version 9 of the
Internet Software Consortium's (ISC) Berkeley Internet Name
Domain (BIND) server. ISC BIND versions 8 and 4 are not
affected. Exploiting this vulnerability will cause the BIND server
to shut down.
I. Description
BIND is an implementation of the Domain Name System (DNS)
that is maintained by the ISC. A vulnerability exists in
version 9 of BIND that allows remote attackers to shut down
BIND servers. An attacker can cause the shutdown by sending a
specific DNS packet designed to trigger an internal consistency
check. However, this vulnerability will not allow an attacker to
execute arbitrary code or write data to arbitrary locations in
memory.
The internal consistency check that triggers the shutdown occurs when
the rdataset parameter to the dns_message_findtype() function in
message.c is not NULL as expected. The condition causes the code to
assert an error message and call abort() to shut down the BIND server.
It is also possible to accidentally trigger this vulnerability using
common queries found in routine operation, especially queries
originating from SMTP servers.
A vulnerability note describing this problem can be found at
http://www.kb.cert.org/vuls/id/739123. This vulnerability note
includes a list of vendors that have been contacted about this
vulnerability.
This vulnerability is also being referenced as CAN-2002-0400:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0400
II. Impact
Exploitation of this vulnerability will cause the BIND server to
abort and shut down. As a result, the BIND server will not be
available unless it is restarted.
III. Solution
Apply a patch from your vendor
The ISC has released BIND version 9.2.1. The CERT/CC recommends
that users of BIND 9 apply a patch from their vendor or
upgrade to BIND 9.2.1.
Appendix A. - Vendor Information
This appendix contains information provided by vendors for
this advisory. As vendors report new information to the
CERT/CC, we will update this section and note the changes in our
revision history. If a particular vendor is not listed below,
we have not received their comments.
Apple
The version of BIND that ships in Mac OS X and Mac OS X Server
does not contain this vulnerability.
BSDI
Wind River Systems, Inc. does not include BIND 9 with any
version of BSD/OS.
Caldera
SCO OpenServer from Caldera does not ship BIND9, and is
therefore not vulnerable. Caldera Open UNIX does ship
BIND9, and is vulnerable. We are investigating. Caldera
OpenLinux does not ship BIND9, and is therefore not
vulnerable.
Compaq Computer Corporation
HP Alpha Server Products:
HP Tru64 UNIX:
Tru64 UNIX is not vulnerable to this reported problem. HP Tru64
UNIX ships with BIND 8.2.2-p5
TCP/IP for HP OpenVms:
TCP/IP for HP OpenVms is not vulnerable to this reported
problem.The current versions of TCP/IP for HP OpenVMS ship BIND
8.2.2-p5
HP NonStop Server:
"HP NonStop Himalaya is not vulnerable to this problem. The
'named' function of Domain Name Server (T6021) which is implemented
for HP NonStop Himalaya is based on BIND 4.8. NonStop DNS is the
only Himalaya software product that includes 'named'."
Cray
Cray, Inc. is not vulnerable since the BIND distributed with
Unicos and Unicos/mk is not based on BIND 9.
Engarde
Guardian Digital does not ship BIND 9 in any versions of
EnGarde Secure Linux, therefore we are not vulnerable. All
versions were shipped with BIND 8.
F5 Networks, Inc.
F5 Networks' products do not include BIND 9, and are therefore
not affected by this vulnerability.
FreeBSD
The FreeBSD base system does not ship with ISC BIND 9. However,
ISC BIND 9 is available in the FreeBSD Ports Collection.
It is currently at version 9.2.1 and is therefore unaffected.
Hewlett-Packard Company
HP is Vulnerable, Solution investigation continuing..
IBM
After analysis of the affected component, IBM has determined
that the AIX bind deamon is not vulnerable to the attack as
described in the CERT advisory.
Internet Software Consortium
This vulnerability was found through routine bug
analysis. BIND 9 is designed to exit when it detects an
internal consistency error to reduce the impact of bugs in the
server. ISC strongly reccomends that all BIND 9 users upgrade
immediately to 9.2.1. BIND 9.2.1 can be found at
http://www.isc.org/products/BIND/bind9.html.
MandrakeSoft
Mandrake Linux 8.x ships with BIND9 and as such updated
packages will be available as early as possible.
Microsoft Corporation
Microsoft has reviewed the information and can confirm that
our products are not affected by this vulnerability.
NEC Corporation
sent on June 3, 2002
[Server Products]
* EWS/UP 48 Series operating system
- is NOT vulnerable.
NetBSD
NetBSD has not included Bind 9 in the base system of any release
or
-current development branch.
Bind 9 is available from the 3rd party software system, pkgsrc.
Users who have installed net/bind9 or net/bind9-current should
update to a fixed version. pkgsrc/security/audit-packages can be
used to keep up to date with these types of issues.
Network Appliance
All NetApp products do not contain any BIND code, so no
NetApp product is vulnerable to this problem.
Nortel Networks Limited
Nortel Networks is reviewing its portfolio to determine if
any products are affected by the vulnerability noted in CERT
Advisory CA-2002-15. A definitive statement will be issued
shortly.
Red Hat
Red Hat distributed BIND 9 in Red Hat Linux versions 7.1, 7.2, and
7.3. We are currently working on producing errata packages, when
complete these will be available along with our advisory at the URL
below. At the same time users of the Red Hat Network will be able
to update their systems using the 'up2date' tool.
http://rhn.redhat.com/errata/RHSA-2002-105.html
Silicon Graphics, Inc.
IRIX does not ship with BIND9 and is not vulnerable.
Sun Microsystems
Sun does not ship BIND 9 with any version of Solaris at this
time and is therefore not affected by this issue.
SuSE, Inc.
We are affected by the bind9 DoS issue as well. All of
our currently supported SuSE Linux products come with a bind9
package. We will release an announcement for the issue,
coordinated with your timeframe and not before we see your
official announcement.
Unisphere Networks, Inc.
The Unisphere Networks ERX family of edge routers does
not implement a DNS server or named daemon within the
Unison OS. Additionally, the DNS client found on the ERX is
not based on the ISC BIND code. Unisphere Networks has no reason
to expect a similar problem exists in the DNS client
implementation found on the ERX.
_________________________________________________________________
The CERT Coordination Center thanks the Internet Software Consortium
for notifying us about this vulnerability.
_________________________________________________________________
Author: Ian A. Finlay
______________________________________________________________________
This document is available from:
http://www.cert.org/advisories/CA-2002-15.html
______________________________________________________________________
CERT/CC Contact Information
Email: cert@cert.org
Phone: +1 412-268-7090 (24-hour hotline)
Fax: +1 412-268-6989
Postal address:
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
U.S.A.
CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) /
EDT(GMT-4) Monday through Friday; they are on call for emergencies
during other hours, on U.S. holidays, and on weekends.
Using encryption
We strongly urge you to encrypt sensitive information sent by
email. Our public PGP key is available from
http://www.cert.org/CERT_PGP.key
If you prefer to use DES, please call the CERT hotline for
more information.
Getting security information
CERT publications and other security information are available
from our web site http://www.cert.org/
To subscribe to the CERT mailing list for advisories and
bulletins, send email to majordomo@cert.org. Please include in
the body of your message
subscribe cert-advisory
* "CERT" and "CERT Coordination Center" are registered in the
U.S. Patent and Trademark Office.
______________________________________________________________________
NO WARRANTY
Any material furnished by Carnegie Mellon University and the Software
Engineering Institute is furnished on an "as is" basis. Carnegie
Mellon University makes no warranties of any kind, either expressed or
implied as to any matter including, but not limited to, warranty of
fitness for a particular purpose or merchantability, exclusivity or
results obtained from use of the material. Carnegie Mellon University
does not make any warranty of any kind with respect to freedom from
patent, trademark, or copyright infringement.
_________________________________________________________________
Conditions for use, disclaimers, and sponsorship information
Copyright 2002 Carnegie Mellon University.
Revision History
June 04, 2002: Initial release
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8
iQCVAwUBPP0kn6CVPMXQI2HJAQFEyQP/fkgF01EWoE2JPDB3kPwLhSUSrM8XHNvQ
+vfuH8ZSUAiG0/g/zSGjeTt0NFYeeI6kMS7MQqS76ECaP93l7gR/zucShEkOKliy
4NHjoF34gPqPlDu6BAdh2xfl9q+LNdu8EHs8rjl1FqjvPKmL436tS0ToJXqXDpmx
/WHO3P3AwhM=
=M/6l
-----END PGP SIGNATURE-----
(8548848) /CERT Advisory <cert-advisory@cert.org>/(Ombruten)
Kommentar i text 8548851 av Exportören