Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 482150 - net-dns/bind: vulnerability in the SRTT algorithm
Summary: net-dns/bind: vulnerability in the SRTT algorithm
Status: RESOLVED WONTFIX
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B4 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-08-22 20:27 UTC by Agostino Sarubbo
Modified: 2016-11-12 13:36 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-08-22 20:27:06 UTC
From ${URL} :

A deficiency in the SRTT (Smoothed Round Trip Time) algorithm in BIND9 was reported that could 
theoretically allow an attacker to lower the SRTT value that a recursive resolver has associated 
with an authoritative server.  This could allow the attacker to influence the selection of a 
specific authoritative server from an NS resource record set with multiple values and thus 
determine which of multiple authoritative servers for a domain will be queried.

ISC has indicated that they intend to address this deficiency by reimplementing the SRTT algorithm 
in a future maintenance release of BIND9.  They also note that "the deficiency in the SRTT 
algorithm is not considered an exploitable security vulnerability on its own".


External References:

https://kb.isc.org/article/AA-01030/169/Operational-Notification-A-Vulnerability-in-the-SRTT-Algorithm-affects-BIND-9-Authoritative-Server-Selection.html


@maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
Comment 1 Chris Reffett (RETIRED) gentoo-dev Security 2013-08-27 00:03:01 UTC
I'll just call this a B4 since it seems to be an information/hijacking attack. Change if desired. Might end up not being a sec bug if it's deemed not CVE-worthy.
Comment 2 Yury German Gentoo Infrastructure gentoo-dev 2016-09-26 04:40:35 UTC
Can anyone advise if this is still an issue of this was fixed a long time ago?

Also redhead has this as wont-fix.
Comment 3 Aaron Bauman (RETIRED) gentoo-dev 2016-11-12 13:36:18 UTC
(In reply to Yury German from comment #2)
> Can anyone advise if this is still an issue of this was fixed a long time
> ago?
> 
> Also redhead has this as wont-fix.

As mentioned by ISC, the implications are minor and it will be fixed by a new implementation of the SRTT algorithm.  Additionally, the deficiency is not considered exploitable by itself.