From owner-freebsd-security@FreeBSD.ORG Tue Jun 14 17:23:24 2011 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 1149C1065672; Tue, 14 Jun 2011 17:23:24 +0000 (UTC) (envelope-from royce.williams@acsalaska.net) Received: from huffman.acsalaska.net (huffman.acsalaska.net [209.112.173.250]) by mx1.freebsd.org (Postfix) with ESMTP id C66918FC1D; Tue, 14 Jun 2011 17:23:23 +0000 (UTC) Received: from [10.0.102.101] (209-112-156-39-adslb0fh.acsalaska.net [209.112.156.39]) by huffman.acsalaska.net (8.14.4/8.14.4) with ESMTP id p5EH6xLg069992; Tue, 14 Jun 2011 09:07:00 -0800 (AKDT) (envelope-from royce.williams@acsalaska.net) Message-ID: <4DF79534.6060507@acsalaska.net> Date: Tue, 14 Jun 2011 09:07:00 -0800 From: Royce Williams Organization: Alaska Communications User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.24) Gecko/20100228 Thunderbird/2.0.0.24 Mnenhy/0.7.5.0 MIME-Version: 1.0 To: freebsd-security@freebsd.org References: <201105280928.p4S9SxXg051018@freefall.freebsd.org> In-Reply-To: <201105280928.p4S9SxXg051018@freefall.freebsd.org> X-Enigmail-Version: 1.1.1 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.3 (huffman.acsalaska.net [209.112.168.121]); Tue, 14 Jun 2011 09:07:00 -0800 (AKDT) X-ACS-Spam-Status: no X-ACS-Scanned-By: MD 2.67; SA 3.3.0; spamdefang 1.122 X-Mailman-Approved-At: Tue, 14 Jun 2011 17:42:35 +0000 Cc: security-advisories@freebsd.org Subject: Re: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-11:02.bind X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 14 Jun 2011 17:23:24 -0000 Patched for modern BSD boxes. No customer impact, as this is patching the OS version of BIND, which is not currently directly facing any external querying. Royce FreeBSD Security Advisories wrote, on 5/28/2011 1:28 AM: > ============================================================================= > FreeBSD-SA-11:02.bind Security Advisory > The FreeBSD Project > > Topic: BIND remote DoS with large RRSIG RRsets and negative caching > > Category: contrib > Module: bind > Announced: 2011-05-28 > Credits: Frank Kloeker, Michael Sinatra. > Affects: All supported versions of FreeBSD. > Corrected: 2011-05-28 00:58:19 UTC (RELENG_7, 7.4-STABLE) > 2011-05-28 08:44:39 UTC (RELENG_7_3, 7.3-RELEASE-p6) > 2011-05-28 08:44:39 UTC (RELENG_7_4, 7.4-RELEASE-p2) > 2011-05-28 00:33:06 UTC (RELENG_8, 8.2-STABLE) > 2011-05-28 08:44:39 UTC (RELENG_8_1, 8.1-RELEASE-p4) > 2011-05-28 08:44:39 UTC (RELENG_8_2, 8.2-RELEASE-p2) > CVE Name: CVE-2011-1910 > > For general information regarding FreeBSD Security Advisories, > including descriptions of the fields above, security branches, and the > following sections, please visit . > > I. Background > > BIND 9 is an implementation of the Domain Name System (DNS) protocols. > The named(8) daemon is an Internet Domain Name Server. > > DNS Security Extensions (DNSSEC) provides data integrity, origin > authentication and authenticated denial of existence to resolvers. > > II. Problem Description > > Very large RRSIG RRsets included in a negative response can trigger > an assertion failure that will crash named(8) due to an off-by-one error > in a buffer size check. > > III. Impact > > If named(8) is being used as a recursive resolver, an attacker who > controls a DNS zone being resolved can cause named(8) to crash, > resulting in a denial of (DNS resolving) service. > > DNSSEC does not need to be enabled on the resolver for it to be > vulnerable. > > IV. Workaround > > No workaround is available, but systems not running the BIND DNS server > or using it exclusively as an authoritative name server (i.e., not as a > caching resolver) are not vulnerable. > > V. Solution > > Perform one of the following: > > 1) Upgrade your vulnerable system to 7-STABLE or 8-STABLE, > or to the RELENG_8_2, RELENG_8_1, RELENG_7_4, or RELENG_7_3 > security branch dated after the correction date. > > 2) To update your vulnerable system via a source code patch: > > The following patches have been verified to apply to FreeBSD > 7.3, 7.4, 8.1 and 8.2 systems. > > a) Download the relevant patch from the location below, and verify the > detached PGP signature using your PGP utility. > > # fetch http://security.FreeBSD.org/patches/SA-11:02/bind.patch > # fetch http://security.FreeBSD.org/patches/SA-11:02/bind.patch.asc > > b) Execute the following commands as root: > > # cd /usr/src > # patch < /path/to/patch > # cd /usr/src/lib/bind > # make obj && make depend && make && make install > # cd /usr/src/usr.sbin/named > # make obj && make depend && make && make install > # /etc/rc.d/named restart > > 3) To update your vulnerable system via a binary patch: > > Systems running 7.3-RELEASE, 7.4-RELEASE, 8.1-RELEASE, or 8.2-RELEASE > on the i386 or amd64 platforms can be updated via the freebsd-update(8) > utility: > > # freebsd-update fetch > # freebsd-update install > > VI. Correction details > > The following list contains the revision numbers of each file that was > corrected in FreeBSD. > > CVS: > > Branch Revision > Path > ------------------------------------------------------------------------- > RELENG_7 > src/contrib/bind9/lib/dns/ncache.c 1.1.1.2.2.3 > RELENG_7_4 > src/UPDATING 1.507.2.36.2.4 > src/sys/conf/newvers.sh 1.72.2.18.2.7 > src/contrib/bind9/lib/dns/ncache.c 1.1.1.2.2.2.2.1 > RELENG_7_3 > src/UPDATING 1.507.2.34.2.8 > src/sys/conf/newvers.sh 1.72.2.16.2.10 > src/contrib/bind9/lib/dns/ncache.c 1.1.1.2.10.1 > RELENG_8 > src/contrib/bind9/lib/dns/ncache.c 1.2.2.4 > RELENG_8_2 > src/UPDATING 1.632.2.19.2.4 > src/sys/conf/newvers.sh 1.83.2.12.2.7 > src/contrib/bind9/lib/dns/ncache.c 1.2.2.2.2.1 > RELENG_8_1 > src/UPDATING 1.632.2.14.2.7 > src/sys/conf/newvers.sh 1.83.2.10.2.8 > src/contrib/bind9/lib/dns/ncache.c 1.2.2.1.2.1 > ------------------------------------------------------------------------- > > Subversion: > > Branch/path Revision > ------------------------------------------------------------------------- > stable/7/ r222399 > releng/7.4/ r222416 > releng/7.3/ r222416 > stable/8/ r222396 > releng/8.2/ r222416 > releng/8.1/ r222416 > head/ r222395 > ------------------------------------------------------------------------- > > VII. References > > http://www.isc.org/software/bind/advisories/cve-2011-1910 > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1910 > > The latest revision of this advisory is available at > http://security.FreeBSD.org/advisories/FreeBSD-SA-11:02.bind.asc _______________________________________________ freebsd-announce@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-announce To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"