[12553] in bugtraq

home help back first fref pref prev next nref lref last post

Re: CERT Advisory CA-99.14 - Multiple Vulnerabilities in BIND

daemon@ATHENA.MIT.EDU (David R. Conrad)
Fri Nov 12 13:39:03 1999

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <382B2373.83A9EDFB@isc.org>
Date:         Thu, 11 Nov 1999 12:13:39 -0800
Reply-To: "David R. Conrad" <David_Conrad@ISC.ORG>
From: "David R. Conrad" <David_Conrad@ISC.ORG>
X-To:         Aleph One <aleph1@UNDERGROUND.ORG>
To: BUGTRAQ@SECURITYFOCUS.COM

Hi,

Just a note on the sequencing of this advisory.  Due to errors on ISC's part,
a web page describing these vulnerabilities was released prior to the CERT
adviories being released.  The original CERT advisory was scheduled to be
released on Wednesday 11/10 (prior to the ISC web page getting linked in), but
was delayed until Monday 11/15 at ISC's request.  Unfortunately, the ISC page
got updated according to the original schedule.  I apologize to all who may
have been negatively impacted by this issue.

Regards,
-drc
Executive Director, ISC
--------
Aleph One wrote:
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> CERT Advisory CA-99-14 Multiple Vulnerabilities in BIND
>
>    Original release date: November 10, 1999
>    Last revised: --
>    Source: CERT/CC
>
>    A complete revision history is at the end of this file.
>
> Systems Affected
>
>      * Systems running various versions of BIND
>
> I. Description
>
>    Six vulnerabilities have been found in BIND, the popular domain name
>    server from the Internet Software Consortium (ISC). One of these
>    vulnerabilities may allow remote intruders to gain privileged access
>    to name servers.
>
> Vulnerability #1: the "nxt bug"
>
>    Some versions of BIND fail to properly validate NXT records. This
>    improper validation could allow an intruder to overflow a buffer and
>    execute arbitrary code with the privileges of the name server.
>
>    NXT record support was introduced in BIND version 8.2. Prior versions
>    of BIND, including 4.x, are not vulnerable to this problem. The
>    ISC-supplied version of BIND corrected this problem in version 8.2.2.
>
> Vulnerability #2: the "sig bug"
>
>    This vulnerability involves a failure to properly validate SIG
>    records, allowing a remote intruder to crash named; see the impact
>    section for additional details.
>
>    SIG record support is found in multiple versions of BIND, including
>    4.9.5 through 8.x.
>
> Vulnerability #3: the "so_linger bug"
>
>    By intentionally violating the expected protocols for closing a TCP
>    session, remote intruders can cause named to pause for periods up to
>    120 seconds.
>
> Vulnerability #4: the "fdmax bug"
>
>    Remote intruders can consume more file descriptors than BIND can
>    properly manage, causing named to crash.
>
> Vulnerability #5: the "maxdname bug"
>
>    Improper handling of certain data copied from the network could allow
>    a remote intruder to disrupt the normal operation of your name server,
>    possibly including a crash.
>
> Vulnerability #6: the "naptr bug"
>
>    Some versions of BIND fail to validate zone information loaded from
>    disk files. In environments with unusual combinations of permissions
>    and protections, this could allow an intruder to crash named.
>
> Other recent BIND-related vulnerabilities
>
>    AusCERT recently published a report describing denial-of-service
>    attacks against name servers. These attacks are unrelated to the
>    issues described in this advisory. For information on the
>    denial-of-service attacks described by AusCERT, please see AusCERT
>    Alert AL-1999.004 available at:
>
>    ftp://ftp.auscert.org.au/pub/auscert/advisory/AL-1999.004.dns_dos
>
> II. Impact
>
> Vulnerability #1
>
>    By exploiting this vulnerability, remote intruders can execute
>    arbitrary code with the privileges of the user running named,
>    typically root.
>
> Vulnerabilities #2, #4, and #5
>
>    By exploiting these vulnerabilities, remote intruders can disrupt the
>    normal operation of your name server, possibly causing a crash.
>
> Vulnerability #3
>
>    By periodically exercising this vulnerability, remote intruders can
>    disrupt the ability of your name server to respond to legitimate
>    queries. By intermittently exercising this vulnerability, intruders
>    can seriously degrade the performance of your name server.
>
> Vulnerability #6
>
>    Local intruders who gain write access to your zone files can cause
>    named to crash.
>
> III. Solution
>
> Apply a patch from your vendor or update to a later version of BIND
>
>    Many operating system vendors distribute BIND with their operating
>    system. Depending on your support procedures, arrangements, and
>    contracts, you may wish to obtain BIND from your operating system
>    vendor rather than directly from ISC.
>
>    Appendix A contains information provided by vendors for this advisory.
>    We will update the appendix as we receive more information. If you do
>    not see your vendor's name, the CERT/CC did not hear from that vendor.
>    Please contact your vendor directly.
>
> Appendix A. Vendor Information
>
> Vendor Name
>
> Caldera
>
>    See ftp://ftp.calderasystems.com/pub/OpenLinux/updates/2.3/current
> MD5s
>         db1dda05dbe0f67c2bd2e5049096b42c  RPMS/bind-8.2.2p3-1.i386.rpm
>         82bbe025ac091831904c71c885071db1  RPMS/bind-doc-8.2.2p3-1.i386.rpm
>         2f9a30444046af551eafd8e6238a50c6  RPMS/bind-utils-8.2.2p3-1.i386.rpm
>         0e4f041549bdd798cb505c82a8911198  SRPMS/bind-8.2.2p3-1.src.rpm
>
> Compaq Computer Corporation
>
>    At the time of writing this document, Compaq is currently
>    investigating the potential impact to Compaq's BIND release(s).
>
>    As further information becomes available Compaq will provide notice of
>    the completion/availability of any necessary patches through AES
>    services (DIA, DSNlink FLASH and posted to the Services WEB page) and
>    be available from your normal Compaq Services Support channel.
>
> Data General
>
>    We are investigating. We will provide an update when our investigation
>    is complete.
>
> Hewlett-Packard Company
>
>    HP is vulnerable, see the chart in the ISC advisory for details on
>    your installed version of BIND. Our fix strategy is under
>    investigation, watch for updates to this CERT advisory in the CERT
>    archives, or an HP security advisory/bulletin.
>
> IBM Corporation
>
>    The bind8 shipped with AIX 4.3.x is vulnerable. We are currently
>    working on the following APARs which will be available soon:
>
>    APAR 4.3.x: IY05851
>
>    To Order
>
>    APARs may be ordered using Electronic Fix Distribution (via FixDist)
>    or from the IBM Support Center. For more information on FixDist,
>    reference URL:
>
>    http://aix.software.ibm.com/aix.us/swfixes/
>
>    or send e-mail to aixserv@austin.ibm.com with a subject of "FixDist".
>
>    IBM and AIX are registered trademarks of International Business
>    Machines Corporation.
>
> The Internet Software Consortium
>
>    ISC has published an advisory regarding these problems, available at
>
>    http://www.isc.org/products/BIND/bind-security-19991108.html
>
>    The ISC advisory also includes a table summarizing which versions of
>    BIND are susceptible to the vulnerabilities described in this
>    advisory.
>
> OpenBSD
>
>    As far as we know, we don't ship with any of those vulnerabilities.
>
> Santa Cruz Operation, Inc
>
>    Security patches for the following SCO products will be made available
>    at http://www.sco.com/security
>
>    OpenServer 5.x.x, UnixWare 7.x.x, UnixWare 2.x.x
>
> Sun Microsystems
>
>    Vulnerability #1
>
>    Solaris 2.3, 2.4, 2.5, 2.5.1, 2.6, and 7 are not vulnerable.
>
>    Vulnerability #2
>
>    Solaris 2.3, 2.4, 2.5, 2.5.1, 2.6, and 7 are not vulnerable.
>
>    Vulnerability #3
>
>    Solaris 2.3, 2.4, 2.5, 2.5.1, and 2.6 are not vulnerable.
>           Sun will be producing patches for Solaris 7.
>
>    Vulnerability #4
>
>    Solaris 2.3, 2.4, 2.5, 2.5.1, and 2.6 are not vulnerable.
>           Solaris 7 is probably not vulnerable. We are still
>           investigating.
>
>    Vulnerability #5
>
>    Solaris 2.3, 2.4, 2.5, 2.5.1, and 2.6 are not vulnerable.
>           Sun will be producing patches for Solaris 7.
>
>    Vulnerability #6
>
>    Solaris 2.3, 2.4, 2.5, 2.5.1, and 2.6 are not vulnerable.
>           Sun will be producing patches for Solaris 7.
>      _________________________________________________________________
>
>    The CERT Coordination Center would like to thank David Conrad, Paul
>    Vixie and Bob Halley of the Internet Software Consortium for notifying
>    us of these problems and for their help in constructing the advisory,
>    and Olaf Kirch of Caldera for notifying us of some of these problems
>    and providing technical assistance and advice.
>    ______________________________________________________________________
>
>    This document is available from:
>    http://www.cert.org/advisories/CA-99-14-bind.html
>    ______________________________________________________________________
>
> CERT/CC Contact Information
>
>    Email: cert@cert.org
>           Phone: +1 412-268-7090 (24-hour hotline)
>           Fax: +1 412-268-6989
>           Postal address:
>           CERT Coordination Center
>           Software Engineering Institute
>           Carnegie Mellon University
>           Pittsburgh PA 15213-3890
>           U.S.A.
>
>    CERT personnel answer the hotline 08:00-20:00 EST(GMT-5) / EDT(GMT-4)
>    Monday through Friday; they are on call for emergencies during other
>    hours, on U.S. holidays, and on weekends.
>
> Using encryption
>
>    We strongly urge you to encrypt sensitive information sent by email.
>    Our public PGP key is available from
>
>    http://www.cert.org/CERT_PGP.key
>
>    If you prefer to use DES, please call the CERT hotline for more
>    information.
>
> Getting security information
>
>    CERT publications and other security information are available from
>    our web site
>
>    http://www.cert.org/
>
>    To be added to our mailing list for advisories and bulletins, send
>    email to cert-advisory-request@cert.org and include SUBSCRIBE
>    your-email-address in the subject of your message.
>
>    Copyright 1999 Carnegie Mellon University.
>    Conditions for use, disclaimers, and sponsorship information can be
>    found in
>
>    http://www.cert.org/legal_stuff.html
>
>    * "CERT" and "CERT Coordination Center" are registered in the U.S.
>    Patent and Trademark Office.
>    ______________________________________________________________________
>
>    NO WARRANTY
>    Any material furnished by Carnegie Mellon University and the Software
>    Engineering Institute is furnished on an "as is" basis. Carnegie
>    Mellon University makes no warranties of any kind, either expressed or
>    implied as to any matter including, but not limited to, warranty of
>    fitness for a particular purpose or merchantability, exclusivity or
>    results obtained from use of the material. Carnegie Mellon University
>    does not make any warranty of any kind with respect to freedom from
>    patent, trademark, or copyright infringement.
>      _________________________________________________________________
>
>    Revision History
> November 10, 1999:  Initial release
>
> -----BEGIN PGP SIGNATURE-----
> Version: PGP for Personal Privacy 5.0
> Charset: noconv
>
> iQA/AwUBOCo3W1r9kb5qlZHQEQIY9QCgjh17l5yAtNrLFSSj2EJ3HYUe8hgAoOol
> 1lRvWBJAlYs63OEqqJ+mCfr2
> =bBA/
> -----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post