Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 146486 - net-dns/bind 9: Multiple DoS vulnerabilities (CVE-2006-4095)
Summary: net-dns/bind 9: Multiple DoS vulnerabilities (CVE-2006-4095)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Other
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.isc.org/sw/bind/
Whiteboard: A3 [glsa] Falco
Keywords:
: 146632 (view as bug list)
Depends on:
Blocks:
 
Reported: 2006-09-05 18:09 UTC by Rajiv Aaron Manglani (RETIRED)
Modified: 2019-12-28 12:34 UTC (History)
5 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
bind-9.3.2-r4.ebuild.diff (bind-9.3.2-r4.ebuild.diff,757 bytes, patch)
2006-09-07 14:46 UTC, Markus Ullmann (RETIRED)
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Rajiv Aaron Manglani (RETIRED) gentoo-dev 2006-09-05 18:09:31 UTC
From: 	  Mark_Andrews@isc.org
	Subject: 	Internet Systems Consortium Security Advisory.
	Date: 	September 5, 2006 7:36:06 PM EDT
	To: 	  bind-announce@isc.org


                Internet Systems Consortium Security Advisory.
                   BIND 9: Multiple DoS vulnerabilities
                            5 September 2006

Versions affected:
	BIND 9.3.0, BIND 9.3.1, BIND 9.3.2, BIND 9.3.3b1 and BIND 9.3.3rc1
	BIND 9.4.0a1, 9.4.0a2, 9.4.0a3, 9.4.0a4, 9.4.0a5, 9.4.0a6 and
	     9.4.0b1.
	See note for BIND 9.2.x
Severity: HIGH
Exploitable: Remotely
Type: DoS

SIG Query Processing (CVE-2006-4095):

	Recursive servers:

	Queries for SIG records will trigger a assertion failure if
	more than one SIG(covered) RRset is returned.

	Exposure can be minimized by restricting sources that can
	ask for recursion.

	Authoritative servers:

	If a nameserver is serving a RFC 2535 DNSSEC zone and is
	queried for the SIG records where the are multiple SIG(covered)
	RRsets (e.g. a zone apex) then named will trigger a assertion
	failure when it trys to construct the response.

Excessive Recursive Queries INSIST failure (CVE-2006-4096):

	It is possible to trigger a INSIST failure by sending enough
	recursive queries that the response to the query arrives after
	all the clients looking for the response have left the recursion
	queue.

	Exposure can be minimized by restricting sources that can
	ask for recursion.

	Note for BIND 9.2.x:
	Code handling this path for 9.2.x has been determined to be wrong,
	though ISC has not been able to detect an execution path that would
	trigger the erroneous code in 9.2.x.
	Nonetheless a patch is provided.

Fix:
	Upgrade to BIND 9.4.0b2, BIND 9.3.3rc2, BIND 9.3.2-P1, BIND 9.2.7rc1
	or BIND 9.2.6-P1 (or later).

	These can be found via: http://www.isc.org/sw/bind/
Comment 1 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-09-06 03:06:29 UTC
Thanks Raviv

Voxus, please bump 9.3.2-p1 please, see http://www.isc.org/sw/bind/bind9.3.php#security
Comment 2 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-09-06 03:29:13 UTC
Note that CVE-2006-2073 seems to be still unfixed on bug #131337.
Comment 3 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-09-06 23:12:53 UTC
*** Bug 146632 has been marked as a duplicate of this bug. ***
Comment 4 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-09-06 23:13:58 UTC
Pulling in herd.
Comment 5 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-09-07 04:05:36 UTC
> Note that CVE-2006-2073 seems to be still unfixed on bug #131337.

yes but CVE-2006-2073, a different issue, remains unpatched and has a weaker gravity. It is very hard to exploit.

BTW, this current bug can be trivially triggered, we need an update asap.
Comment 6 Markus Ullmann (RETIRED) gentoo-dev 2006-09-07 14:46:21 UTC
Created attachment 96326 [details, diff]
bind-9.3.2-r4.ebuild.diff

As I've been affected, I investigated needed steps and this small ebuild diff made it for me
Comment 7 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-09-08 05:21:37 UTC
> bind-9.3.2-r4.ebuild.diff


thanks, i'm using it now.

Bind team, please advise
Comment 8 Konstantin Arkhipov (RETIRED) gentoo-dev 2006-09-11 02:47:38 UTC
committed 9.2.6-r4 and 9.3.2-r4
tested on x86 and ~amd64
Comment 9 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-09-11 02:51:11 UTC
Thx Konstantin.

Arches please test and mark stable.
Comment 10 Konstantin Arkhipov (RETIRED) gentoo-dev 2006-09-11 06:47:19 UTC
amd64 stable.
Comment 11 Tobias Scherbaum (RETIRED) gentoo-dev 2006-09-11 09:44:30 UTC
ppc stable
Comment 12 Markus Rothe (RETIRED) gentoo-dev 2006-09-11 13:28:10 UTC
ppc64 stable
Comment 13 Jason Wever (RETIRED) gentoo-dev 2006-09-11 18:13:36 UTC
S
 P
  A
   R
    C

S
 T
  A
   B
    L
     E
Comment 14 Thomas Cort (RETIRED) gentoo-dev 2006-09-12 07:40:17 UTC
alpha stable.
Comment 15 Matthias Geerdsen (RETIRED) gentoo-dev 2006-09-12 08:03:06 UTC
for some reason x86 wasn't added to CC... fixing

hppa, x86 pls test an mark 9.2.6-r4 and 9.3.2-r4 stable if possible
Comment 16 Tony Vroon (RETIRED) gentoo-dev 2006-09-12 09:12:27 UTC
X86 stable. Bind passes collision test, 9.3.2-r4 tested in production.
Comment 17 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-09-14 01:34:02 UTC
HPPA team, any trouble here ?
Comment 18 Gustavo Zacarias (RETIRED) gentoo-dev 2006-09-14 10:34:05 UTC
killerfox is probably away so i took it.
hppa stable.
Comment 19 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-09-14 15:50:22 UTC
This one is ready for GLSA.
Comment 20 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-09-15 05:10:57 UTC
welcome to GLSA 200609-11!