Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 463497 (CVE-2013-2266) - <net-dns/bind-9.9.2_p2: Regular Expression Handling Denial of Service Vulnerability (CVE-2013-2266)
Summary: <net-dns/bind-9.9.2_p2: Regular Expression Handling Denial of Service Vulnera...
Status: RESOLVED FIXED
Alias: CVE-2013-2266
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://secunia.com/advisories/52782/
Whiteboard: B3 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-03-27 15:24 UTC by Agostino Sarubbo
Modified: 2014-01-29 22:52 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-03-27 15:24:17 UTC
From ${URL} :

Description
A vulnerability has been reported in ISC BIND, which can be exploited by malicious people to cause 
a DoS (Denial of Service).

The vulnerability is caused due to an unspecified error when handling regular expressions. This can 
be exploited to exhaust memory resources and render the server unusable.

Please see the vendor's advisory for a list of affected versions.


Solution
Apply patches or update to a fixed release (please see the vendor's advisory for details).

Provided and/or discovered by
The vendor credits Matthew Horsfall, Dyn.

Original Advisory
ISC:
https://kb.isc.org/article/AA-00871
Comment 1 Christian Ruppert (idl0r) gentoo-dev 2013-03-29 13:18:10 UTC
9.9.2-P2 has been added.
Comment 2 Sean Amoss (RETIRED) gentoo-dev Security 2013-03-30 13:31:26 UTC
(In reply to comment #1)
> 9.9.2-P2 has been added.

Thanks, Christian. Is this ready for stabilization?
Comment 3 Christian Ruppert (idl0r) gentoo-dev 2013-03-30 19:21:16 UTC
(In reply to comment #2)
> (In reply to comment #1)
> > 9.9.2-P2 has been added.
> 
> Thanks, Christian. Is this ready for stabilization?

Yes.
Comment 4 Sean Amoss (RETIRED) gentoo-dev Security 2013-04-08 21:43:38 UTC
Arches, please test and mark stable:
=net-dns/bind-9.9.2_p2
Target KEYWORDS: "alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris"
Comment 5 Agostino Sarubbo gentoo-dev 2013-04-09 18:15:14 UTC
amd64 stable
Comment 6 Agostino Sarubbo gentoo-dev 2013-04-09 18:26:13 UTC
x86 stable
Comment 7 Jeroen Roovers (RETIRED) gentoo-dev 2013-04-10 14:42:09 UTC
Stable for HPPA.
Comment 8 GLSAMaker/CVETool Bot gentoo-dev 2013-04-11 16:38:47 UTC
CVE-2013-2266 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2266):
  libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2,
  9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows
  remote attackers to cause a denial of service (memory consumption) via a
  crafted regular expression, as demonstrated by a memory-exhaustion attack
  against a machine running a named process.
Comment 9 Agostino Sarubbo gentoo-dev 2013-04-11 18:59:14 UTC
ppc stable
Comment 10 Agostino Sarubbo gentoo-dev 2013-04-11 19:28:42 UTC
ppc64 stable
Comment 11 Agostino Sarubbo gentoo-dev 2013-04-11 21:02:31 UTC
alpha stable
Comment 12 Agostino Sarubbo gentoo-dev 2013-04-12 15:08:06 UTC
arm stable
Comment 13 Agostino Sarubbo gentoo-dev 2013-04-12 17:19:14 UTC
ia64 stable
Comment 14 Agostino Sarubbo gentoo-dev 2013-04-13 07:22:18 UTC
sparc stable
Comment 15 Agostino Sarubbo gentoo-dev 2013-04-13 20:48:09 UTC
s390 stable
Comment 16 Agostino Sarubbo gentoo-dev 2013-04-14 11:46:58 UTC
sh stable
Comment 17 Sean Amoss (RETIRED) gentoo-dev Security 2013-04-20 13:28:43 UTC
Added to existing GLSA draft.
Comment 18 GLSAMaker/CVETool Bot gentoo-dev 2014-01-29 22:52:47 UTC
This issue was resolved and addressed in
 GLSA 201401-34 at http://security.gentoo.org/glsa/glsa-201401-34.xml
by GLSA coordinator Sean Amoss (ackle).