Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 522570 (CVE-2014-3614) - <net-dns/pdns-recursor-3.6.1: A specific sequence of packets can crash PowerDNS Recursor 3.6.0 remotely (CVE-2014-3614)
Summary: <net-dns/pdns-recursor-3.6.1: A specific sequence of packets can crash PowerD...
Status: RESOLVED FIXED
Alias: CVE-2014-3614
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: http://blog.powerdns.com/2014/09/10/s...
Whiteboard: ~3 [noglsa]
Keywords:
: 524450 (view as bug list)
Depends on:
Blocks:
 
Reported: 2014-09-11 08:32 UTC by Ronny Boesger
Modified: 2014-11-04 16:34 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Ronny Boesger 2014-09-11 08:32:16 UTC
We regret that we have to announce a PowerDNS Recursor security release:

Issue:    A specific sequence of packets can crash PowerDNS Recursor 3.6.0 remotely
CVE:      CVE-2014-3614
Affected: All deployments of PowerDNS Recursor 3.6.0 
Not Affected: 
          PowerDNS Authoritative Server, PowerDNS Recursor versions other than 3.6.0 
Workaround: 
          1) Only users from netmasks specified in 'allow-from' can cause the crash 
          2) add automated restarting
Remediation: 
          Upgrade to 3.6.1, or apply our minimal patch and recompile
          Distributions shipping 3.6.0 have been notified and will be providing updates very soon

Recently, we’ve discovered that PowerDNS Recursor 3.6.0 (but NOT earlier) can crash when exposed to a specific sequence of malformed packets. This sequence happened spontaneously with one of our largest deployments, and the packets did not appear to have a malicious origin.

Yet, this crash can be triggered remotely, leading to a denial of service attack. There appears to be no way to use this crash for system compromise or stack overflow.
Comment 1 Kristian Fiskerstrand (RETIRED) gentoo-dev 2014-09-11 08:37:54 UTC
(In reply to Ronny Boesger from comment #0)
> We regret that we have to announce a PowerDNS Recursor security release:
> 
Thank you for the report.

@maintainer(s): after the bump please advice or initiate stabilization as needed.
Comment 2 Kristian Fiskerstrand (RETIRED) gentoo-dev 2014-09-11 08:45:58 UTC
Changing rating from B to ~ as the 3.6 branch has never been stabilized. That also removes any need for stabilization for this bug. 

After the bump, please clean up the vulnerable version.
Comment 3 Sven Wegener gentoo-dev 2014-10-23 10:14:26 UTC
*** Bug 524450 has been marked as a duplicate of this bug. ***
Comment 4 Sven Wegener gentoo-dev 2014-10-23 10:16:10 UTC
3.6.1 is in the tree and 3.6.0 is gone.
Comment 5 Jeroen Roovers (RETIRED) gentoo-dev 2014-10-23 10:23:45 UTC
(In reply to Sven Wegener from comment #4)
> 3.6.1 is in the tree and 3.6.0 is gone.

So... where is the stabilisation request?
Comment 6 Ronny Boesger 2014-11-04 16:08:38 UTC
3.6.2 is out since Oct 30, 2014, which fixes some issues in 3.6.1
URL: http://doc.powerdns.com/html/changelog.html#changelog-recursor-3.6.2
Comment 7 Agostino Sarubbo gentoo-dev 2014-11-04 16:34:46 UTC
closing as noglsa.