Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2013.1037 bind Denial of Service (CVE-2013-4854) 31 July 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: bind Publisher: NetBSD Operating System: NetBSD Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2013-4854 Reference: ESB-2013.1032 ESB-2013.1019 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 NetBSD Security Advisory 2013-005 ================================= Topic: bind Denial of Service (CVE-2013-4854) Version: NetBSD-current: source prior to July 28th, 2013 NetBSD 6.1: affected NetBSD 6.0: affected NetBSD 5.2: affected NetBSD 5.1: affected Severity: Denial of Service Fixed: NetBSD-current: July 27th, 2013 NetBSD-6-0 branch: July 29th, 2013 NetBSD-6-1 branch: July 29th, 2013 NetBSD-6 branch: July 29th, 2013 NetBSD-5-2 branch: July 29th, 2013 NetBSD-5-1 branch: July 29th, 2013 NetBSD-5 branch: July 29th, 2013 Please note that NetBSD releases prior to 5.1 are no longer supported. It is recommended that all users upgrade to a supported release. Abstract ======== A specially crafted query that includes malformed rdata can cause named to terminate with an assertion failure while rejecting the malformed query. This vulnerability has been assigned CVE-2013-4854. Technical Details ================= Authoritative and recursive servers are equally vulnerable. Intentional exploitation of this condition can cause a denial of service in nameservers running affected versions of BIND 9. BIND Access Control Lists do not provide any protection from malicious clients. In addition to the named server, applications built using libdns from the affected source distributions may crash with assertion failures triggered in the same fashion. Solutions and Workarounds ========================= If feasible, as a workaround, restrict access to the nameserver to only trusted clients via a packet filter. Solutions: - - - Install and use a bind package from pkgsrc. - - - Update libdns from a daily build later than the fix date: fetch from http://nyftp.NetBSD.org/pub/NetBSD-daily/<branch>/<date>/<arch>/ the file binary/sets/base.tgz for NetBSD 5.x: cd / && tar xzpf <base.tgz-path> ./usr/lib/libdns.so.1.4 if your arch has 32bit-compat, update the compat lib as well, e.g. for amd64: cd / && tar xzpf <base.tgz-path> ./usr/lib/i386/libdns.so.1.4 for NetBSD 6.x: cd / && tar xzpf <base.tgz-path> ./usr/lib/libdns.so.5.8 if your arch has 32bit-compat, update the compat lib as well, e.g. for amd64: cd / && tar xzpf <base.tgz-path> ./usr/lib/i386/libdns.so.5.8 - - - Rebuild your system with the fixes applied. The wrong bounds checking is in bind's lib/dns/rdata/generic/keydata_65533.c Fixed versions: current: src/external/bsd/bind/dist/lib/dns/rdata/generic/keydata_65533.c 1.6 netbsd-6: src/external/bsd/bind/dist/lib/dns/rdata/generic/keydata_65533.c 1.3.4.2 netbsd-6-1: src/external/bsd/bind/dist/lib/dns/rdata/generic/keydata_65533.c 1.3.4.1.6.1 netbsd-6-0: src/external/bsd/bind/dist/lib/dns/rdata/generic/keydata_65533.c 1.3.4.1.4.1 netbsd-5: src/dist/bind/lib/dns/rdata/generic/keydata_65533.c 1.1.2.4 netbsd-5-2: src/dist/bind/lib/dns/rdata/generic/keydata_65533.c 1.1.2.3.2.1 netbsd-5-1: src/dist/bind/lib/dns/rdata/generic/keydata_65533.c 1.1.4.5 Thanks To ========= Thanks to Maxim Shudrak and the HP Zero Day Initiative for reporting this issue and the ISC security team for their advisory (https://kb.isc.org/article/AA-01015). Revision History ================ 2013-07-30 Initial release More Information ================ Advisories may be updated as new information becomes available. The most recent version of this advisory (PGP signed) can be found at http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2013-005.txt.asc Information about NetBSD and NetBSD security can be found at http://www.NetBSD.org/ and http://www.NetBSD.org/Security/ . Copyright 2013, The NetBSD Foundation, Inc. All Rights Reserved. Redistribution permitted only in full, unmodified form. $NetBSD: NetBSD-SA2013-005.txt,v 1.2 2013/07/30 20:44:22 tonnerre Exp $ - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBAgAGBQJR+CX5AAoJEAZJc6xMSnBukpUQAJC3dydlOI9KumiZfQUa+MZ/ GPVFNkfSLXMqujJdsB12bE1oT4Oeu4ylSadtCZWgPyiaXZ46uEkFgPODU88JxdAr z4ha31LoFEU+WRSPWeSgJdnX5IHvsyrSzXXoOZc0K99nVRIF67ecgAGHNkxmvghv /zsxfJrAabbdInpX0BzDmu/KE2AlATY7KFAZigqAJH80JAIJ7tAAmnrzfVOD2jXx FGEok/Cz3bAoEUfPG5S77OKAKrq5BmJ9iyfqLd7Hv2vZucBVyPe0FaYAKFsseevI KkHcf9cHPgUiqCsBGnKD1+qL1oV15gAlshhcHUAl+pn7QhsKwJGebKy5ZmeWYy4i WfkH8XMHKKJGvZBxRkqCZNmMmyby6NxSiV1xAMCsiClDVxOoxApMkF8dDsSVUBoJ kE16/x9A3A11kizCaC0+OagezJAsOpHWqyLncIcZN1fJ+mzWFfm7eWnY9GDE22wV 26NNGhMi0AZvBvhFVqjs8GYzc50BYjMYdqWkL+FrITkofTWeGuO7QXujDGdIYsPJ nTNUASMqcvXp9vLkXPLssV4nf3eks1kuaGDM+AdaDkFiH8pj6dVofiYkJeRCobtV jJAc9h8xgm1Rr8h6eqQi14R+DVxt6H5Em10brQrufM16xglmhFoyb1JBm/2FDztw ifNWNjfA+euXhJBVue3b =oGEr - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUfiLyxLndAQH1ShLAQKzYBAAuozLW45cjnhCLj61UbqB7VB7FeiSBlsY V7Ng1+o4+eJb2oA8PtPwyO++H088ISQbZb9DAaaXDpBJWx30AziH8j+KKx6FlGdO 7qwtGGwviYaWGUPsKtOfLWaqNL+Os40uwwI8YHOB7z8H+fbbqi8Emu6gbRfKEYyq IT3KiTwU0CjopEbHZLd/w0/YJ7o82KY0hrNyR1rJLOyqK3i48GNLAm7ILmtv5YRF sY4sSMksECNv83KTgRHXKPbfvCRjPrCRkDODGyNSqLHePjWWuX2MeEWd0qxzwUem GyZHNSY2M8EMxxkLw2yprM9dNLYvQwWiEftJD6Spw+toktuBOmTGplVm+CcWP/p3 qbDH3ng371W1IwIU8gYZca6V+UC6BZbdzBcSSgnxQRVV6g5+oWZQvHwjAjorkFk+ +OlWqiEHXQYYUcR3+UAbdo9cQn5COY5+MKRUEI2ceGvAA7cAaSfHBEEqO+UHxtiJ HL1v/5RMvIzYlC0cmuKz4hLKRMhaSZKPiOB6g7ZasBvDf9O0d7ju0DHIxN36IND5 rIHQLNJ4pecfHIFdvEBVRzVREUGn2fvA8gDTU0R5TKC6BWFT5VpYjVUnQF5ZTKi3 ScdJ2G01tZDEdbY9s5eVDgOj9tjhAzVHWmkjQYvGS069HUutDnM84llzttBEGj3w 3lEK0sE6smM= =UBh7 -----END PGP SIGNATURE-----