Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 238119 (CVE-2008-4100) - net-libs/adns Insufficient randomness in transaction id / source port (CVE-2008-4100)
Summary: net-libs/adns Insufficient randomness in transaction id / source port (CVE-20...
Status: RESOLVED FIXED
Alias: CVE-2008-4100
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://bugs.debian.org/cgi-bin/bugrep...
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2008-09-19 15:17 UTC by Robert Buchholz (RETIRED)
Modified: 2009-06-12 22:23 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2008-09-19 15:17:29 UTC
CVE-2008-4100 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4100):
  GNU adns 1.4 and earlier uses a fixed source port and sequential
  transaction IDs for DNS requests, which makes it easier for remote
  attackers to spoof DNS responses, a different vulnerability than
  CVE-2008-1447.  NOTE: the vendor reports that this is intended
  behavior and is compatible with the product's intended role in a
  trusted environment.
Comment 1 Daniel Black (RETIRED) gentoo-dev 2009-02-04 12:45:11 UTC
adns-1.4 there and stable - bug 213740
Comment 2 Robert Buchholz (RETIRED) gentoo-dev 2009-02-12 19:23:03 UTC
vote: YES
Comment 3 Stefan Behte (RETIRED) gentoo-dev Security 2009-02-12 19:47:37 UTC
Yes, too. Request filed.
Comment 4 Robert Buchholz (RETIRED) gentoo-dev 2009-02-13 15:16:36 UTC
wait, this was wrong.

The bug is not fixed in 1.4, and according to upstreams statements[0] it will not be fixed within adns. Users will have to make sure that that adns is used against a nameserver in a trusted network.

However, I am not sure if this is the case with all applications using adns: http://tinderbox.dev.gentoo.org/misc/rindex/net-libs/adns

[0] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698
Comment 5 Robert Buchholz (RETIRED) gentoo-dev 2009-02-13 15:44:55 UTC
dragonheard, coldwind -- you guys seem to use adns. Its INSTALL file contains this notice, and I think we need to either display it an ewarn, install it as some README.SECURITY file, or remove the package.

SECURITY AND PERFORMANCE - AN IMPORTANT NOTE

adns is not a `full-service resolver': it does no caching of responses
at all, and has no defence against bad nameservers or fake packets
which appear to come from your real nameservers.  It relies on the
full-service resolvers listed in resolv.conf to handle these tasks.

For secure and reasonable operation you MUST run a full-service
nameserver on the same system as your adns applications, or on the
same local, fully trusted network.  You MUST only list such
nameservers in the adns configuration (eg resolv.conf).
...
Comment 6 Daniel Black (RETIRED) gentoo-dev 2009-02-15 02:13:47 UTC
nice pickup Robert. ewarnings and README.security installed.
Comment 7 Pierre-Yves Rofes (RETIRED) gentoo-dev 2009-04-19 12:47:47 UTC
Do we really want to issue a glsa about this after all? It has a pending draft, but since it's not really fixed and the ewarn clearly mentions it, I would say no.
Comment 8 Stefan Behte (RETIRED) gentoo-dev Security 2009-06-12 22:23:43 UTC
I think it is ok that way. No, too.
Feel free to reopen if you think otherwise.