Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 260975 (CVE-2009-0858) - <net-dns/djbdns-1.05-r23 DNS label compression cache poisoning (CVE-2009-0858)
Summary: <net-dns/djbdns-1.05-r23 DNS label compression cache poisoning (CVE-2009-0858)
Status: RESOLVED FIXED
Alias: CVE-2009-0858
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://article.gmane.org/gmane.networ...
Whiteboard: B4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2009-03-02 17:31 UTC by Robert Buchholz (RETIRED)
Modified: 2014-05-31 20:03 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2009-03-02 17:31:50 UTC
On Sunday 01 March 2009, Florian Weimer wrote:
> tinydns from djbdns version 1.05 and earlier incorrectly implements
> DNS label compression, allowing malicious zone editors to inject
> poisonous records into the additional section.
Comment 1 Stefan Behte (RETIRED) gentoo-dev Security 2009-03-07 17:28:01 UTC
There is a (very simple!) patch on $URL. Do we have any reason not to apply it? DJB reviewed it: http://article.gmane.org/gmane.network.djbdns/13864


Comment 2 Robert Buchholz (RETIRED) gentoo-dev 2009-03-10 16:12:10 UTC
CVE-2009-0858 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0858):
  The response_addname function in response.c in Daniel J. Bernstein
  djbdns 1.05 and earlier does not constrain offsets in the required
  manner, which allows remote attackers, with control over a
  third-party subdomain served by tinydns and axfrdns, to trigger DNS
  responses containing arbitrary records via crafted zone data for this
  subdomain.

Comment 3 Gordon Malm (RETIRED) gentoo-dev 2009-03-18 22:58:58 UTC
Hello, add patch?
Comment 4 Robert Buchholz (RETIRED) gentoo-dev 2009-03-19 13:22:39 UTC
gengor, please feel free to do a revision bump and apply this patch under the authority of the security team.
Comment 5 Gordon Malm (RETIRED) gentoo-dev 2009-03-19 19:35:06 UTC
CVE-2009-0858 is fixed in =net-dns/djbdns-1.05-r23.  During bumping I noticed in the case of USE="ipv6" the patches for bug #260014 were only being applied to the noipv6 workdir used for building dnstrace.  I've ported the CVE-2008-4392 to the ipv6-patched version and ensured both workdirs get patched.  Hopefully my ported patches don't suck.

Arches, please test and mark stable:
=net-dns/djbdns-1.05-r23
Target keywords : "alpha amd64 hppa ppc ppc64 sparc x86"
Comment 6 Brent Baude (RETIRED) gentoo-dev 2009-03-20 12:50:34 UTC
ppc and ppc64 done
Comment 7 Markus Meier gentoo-dev 2009-03-20 23:39:08 UTC
amd64/x86 stable
Comment 8 Tobias Klausmann (RETIRED) gentoo-dev 2009-03-22 15:11:32 UTC
Stable on alpha.
Comment 9 Friedrich Oslage (RETIRED) gentoo-dev 2009-03-22 17:54:41 UTC
sparc stable
Comment 10 Jeroen Roovers (RETIRED) gentoo-dev 2009-03-23 05:13:23 UTC
Stable for HPPA.
Comment 11 Gordon Malm (RETIRED) gentoo-dev 2009-03-23 16:35:52 UTC
(In reply to comment #10)
> Stable for HPPA.
> 

That's everyone, though mips is still stuck on =net-dns/djbdns-1.05-r17 for stable.

=net-dns/djbdns-1.05-r22 can be removed, leaving that for killerfox when he gets back.
Comment 12 Tobias Heinlein (RETIRED) gentoo-dev 2009-04-04 15:02:14 UTC
Ready for vote, I vote YES.
Comment 13 Stefan Behte (RETIRED) gentoo-dev Security 2009-04-23 17:00:41 UTC
Yes, too, request filed.
Comment 14 Michael Orlitzky gentoo-dev 2011-03-29 17:08:01 UTC
Could also be closed, all affected versions are gone from the tree.
Comment 15 Sean Amoss (RETIRED) gentoo-dev Security 2014-05-31 20:03:23 UTC
This issue has been fixed since Mar 23, 2009. No GLSA will be issued.