Bug 7469 - bind - A specially crafted Resource Record could cause named to terminate (CVE-2012-4244)
: bind - A specially crafted Resource Record could cause named to terminate (CV...
Status: RESOLVED FIXED
Product: Mageia
Classification: Unclassified
Component: Security
: 2
: i586 Linux
: Normal Severity: critical
: ---
Assigned To: QA Team
:
: http://lwn.net/Vulnerabilities/516075/
: MGA1TOO MGA2-32-OK MGA2-64-OK MGA1-32...
: validated_update
:
:
  Show dependency treegraph
 
Reported: 2012-09-13 09:19 CEST by Oden Eriksson
Modified: 2012-09-13 23:20 CEST (History)
4 users (show)

See Also:
Source RPM: bind
CVE:
Status comment:


Attachments

Description Oden Eriksson 2012-09-13 09:19:10 CEST
https://kb.isc.org/article/AA-00778

CVE-2012-4244: A specially crafted Resource Record could cause named
               to terminate

A nameserver can be caused to exit with a REQUIRE exception if it
can be induced to load a specially crafted resource record.

CVE: CVE-2012-4244
Document Version:          2.0
Posting date: 12 September 2012
Program Impacted: BIND
Versions affected:
   9.0.x -> 9.6.x, 9.4-ESV->9.4-ESV-R5-P1, 9.6-ESV->9.6-ESV-R7-P2,
   9.7.0->9.7.6-P2, 9.8.0->9.8.3-P2, 9.9.0->9.9.1-P2
Severity: Critical
Exploitable: Remotely

Description:

   If a record with RDATA in excess of 65535 bytes is loaded into
   a nameserver, a subsequent query for that record will cause named
   to exit with an assertion failure.

   Please Note: Versions of BIND 9.4 and 9.5 are also affected, but
   these branches are beyond their "end of life" (EOL) and no longer
   receive testing or security fixes from ISC. For current information
   on which versions are actively supported, please see
   http://www.isc.org/software/bind/versions.

Impact:

   This vulnerability can be exploited remotely against recursive
   servers by inducing them to query for records provided by an
   authoritative server. It affects authoritative servers if a zone
   containing this type of resource record is loaded from file or
   provided via zone transfer.

CVSS Score:  7.8

CVSS Equation:  (AV:N/AC:L/Au:N/C:N/I:N/A:C)

For more information on the Common Vulnerability Scoring System and
to obtain your specific environmental score please visit:
http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:C)

Workarounds:  None are known at this time.

Active exploits:  No known active exploits.

Solution: 

   Upgrade to the patched version or new release most closely related
   to your current version of BIND.

   The patched versions (-P3) of BIND can be downloaded from
   http://www.isc.org/downloads/all.  The new release versions will
   be available within the next week.

   BIND 9 version 9.7.7, 9.7.6-P3
   BIND 9 version 9.6-ESV-R8, 9.6-ESV-R7-P3
   BIND 9 version 9.8.4, 9.8.3-P3
   BIND 9 version 9.9.2, 9.9.1-P3


Document Revision History:

   1.0 - 4 Sept., 2012  Advance Notification to Phase 1
   1.1 - 6 Sept. 2012 Corrected error in Description (65535 bytes)
   1.2 - 11 Sept. 2012 Phase 2 & 3 notified
   2.0 - 12 Sept. 2012 Phase 4 - Public Released

Related Documents:

   See our BIND Security Matrix for a complete listing of Security
   Vulnerabilities and versions affected.

   If you'd like more information on our Forum or product support
   please visit www.isc.org/software/guild or www.isc.org/support.

Do you still have questions?  Questions regarding this advisory
should go to security-officer@isc.org

Note: ISC patches only currently supported versions. When possible
we indicate EOL versions affected.

ISC Security Vulnerability Disclosure Policy:  Details of our current
security advisory policy and practice can be found here:
https://www.isc.org/security-vulnerability-disclosure-policy

The Knowledge Base article https://kb.isc.org/article/AA-00778 is
the complete and official security advisory document.  There is
also a summary article located on our website and linking to here:
https://www.isc.org/software/bind/advisories/cve-2012-4244

Legal Disclaimer: 

   Internet Systems Consortium (ISC) is providing this notice on
   an "AS IS" basis. No warranty or guarantee of any kind is expressed
   in this notice and none should be implied. ISC expressly excludes
   and disclaims any warranties regarding this notice or materials
   referred to in this notice, including, without limitation, any
   implied warranty of merchantability, fitness for a particular
   purpose, absence of hidden defects, or of non-infringement. Your
   use or reliance on this notice or materials referred to in this
   notice is at your own risk. ISC may change this notice at any
   time.  A stand-alone copy or paraphrase of the text of this
   document that omits the document URL is an uncontrolled copy.
   Uncontrolled copies may lack important information, be out of
   date, or contain factual errors.

(c) 2001-2012 Internet Systems Consortium
_______________________________________________
bind-announce mailing list
bind-announce@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-announce
Comment 1 David Walser 2012-09-13 14:04:16 CEST
Mandriva has issued an advisory for this today (September 13):
http://www.mandriva.com/en/support/security/advisories/?dis=mes5&name=MDVSA-2012:152
Comment 3 David Walser 2012-09-13 21:09:26 CEST
Updated packages uploaded for Mageia 1 and Mageia 2.

Advisory to come.

Package list:
bind-9.8.3P3-1.mga1
bind-utils-9.8.3P3-1.mga1
bind-devel-9.8.3P3-1.mga1
bind-doc-9.8.3P3-1.mga1
bind-9.9.1.P3-1.mga2
bind-sdb-9.9.1.P3-1.mga2
bind-utils-9.9.1.P3-1.mga2
bind-devel-9.9.1.P3-1.mga2
bind-doc-9.9.1.P3-1.mga2

from SRPMS:
bind-9.8.3P3-1.mga1
bind-9.9.1.P3-1.mga2
Comment 4 David Walser 2012-09-13 22:29:58 CEST
Advisory:
========================

Updated bind packages fix security vulnerability:

A nameserver can be caused to exit with a REQUIRE exception if it can
be induced to load a specially crafted resource record (CVE-2012-4244).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4244
https://kb.isc.org/article/AA-00778
https://kb.isc.org/article/AA-00789
https://kb.isc.org/article/AA-00788
http://www.mandriva.com/en/support/security/advisories/?dis=mes5&name=MDVSA-2012:152
========================

Updated packages in core/updates_testing:
========================
bind-9.8.3P3-1.mga1
bind-utils-9.8.3P3-1.mga1
bind-devel-9.8.3P3-1.mga1
bind-doc-9.8.3P3-1.mga1
bind-9.9.1.P3-1.mga2
bind-sdb-9.9.1.P3-1.mga2
bind-utils-9.9.1.P3-1.mga2
bind-devel-9.9.1.P3-1.mga2
bind-doc-9.9.1.P3-1.mga2

from SRPMS:
bind-9.8.3P3-1.mga1.src.rpm
bind-9.9.1.P3-1.mga2.src.rpm
Comment 5 Dave Hodgins 2012-09-13 22:48:26 CEST
Testing complete on Mageia 2 i586 and x86-64.

Testing using host, dig, and nslookup with the server at 127.0.0.1.

Will test Mageia 1 shortly.
Comment 6 Dave Hodgins 2012-09-13 22:54:08 CEST
Testing complete on Mageia 1 i586 and x86-64.

Could someone from the sysadmin team push the srpm
bind-9.9.1.P3-1.mga2.src.rpm
from Mageia 2 Core Updates Testing to Core Updates and the srpm
bind-9.8.3P3-1.mga1.src.rpm
from Mageia 1 Core Updates Testing to Core Updates.

Advisory: Updated bind packages fix security vulnerability:

A nameserver can be caused to exit with a REQUIRE exception if it can
be induced to load a specially crafted resource record (CVE-2012-4244).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4244
https://kb.isc.org/article/AA-00778
https://kb.isc.org/article/AA-00789
https://kb.isc.org/article/AA-00788
http://www.mandriva.com/en/support/security/advisories/?dis=mes5&name=MDVSA-2012:152

https://bugs.mageia.org/show_bug.cgi?id=7469
Comment 7 Thomas Backlund 2012-09-13 23:20:01 CEST
Update pushed:
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0269

Note You need to log in before you can comment on or make changes to this bug.