Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140912131455.GA19179@openwall.com>
Date: Fri, 12 Sep 2014 17:14:55 +0400
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Cc: bert hubert <bert.hubert@...herlabs.nl>
Subject: PowerDNS Recursor 3.6.0 can be crashed remotely (CVE-2014-3614)

Hi,

A security advisory and a security update for PowerDNS Recursor were
posted on September 10:

http://blog.powerdns.com/2014/09/10/security-update-powerdns-recursor-3-6-1/
http://doc.powerdns.com/html/powerdns-advisory-2014-01.html

"Issue: A specific sequence of packets can crash PowerDNS Recursor 3.6.0 remotely
CVE: CVE-2014-3614
Affected: All deployments of PowerDNS Recursor 3.6.0
Not Affected: PowerDNS Authoritative Server, PowerDNS Recursor versions other than 3.6.0"

"There appears to be no way to use this crash for system compromise or
stack overflow."

Please refer to the URL above for much more detail, and a patch.
Looking at the patch, I see that one of the conditions it handles is
"labellen > 63", and it throws an exception when this happens.  It is
not clear to me whether or not arbitrary code execution is possible via
this vulnerability (via any of several issues that are now patched).
The pieces seen within the (very limited) context of the patch look like
the risk is there, and it'd take thorough analysis or a PoC to arrive at
either conclusion with confidence.

This issue was brought to the distros list at about the same time that
it was made public.  Per distros list policy, the issue must also be
brought to oss-security:

http://oss-security.openwall.org/wiki/mailing-lists/distros#how-to-use-the-lists

"When the security issue is finally to be made public, it is your (the
original reporter's) responsibility to post about it to oss-security"

Since the issue was already public on the same day, I think it should
have been posted to oss-security right away, without use of the distros
list.  (Any distro on the distros list is supposed to also be on
oss-security.)  The wiki page states this, too:

"Please only use these lists to report and discuss security issues that
are not yet public (but that are to be made public very soon - please
see below).  For security issues that are already public or that are to
be made public right away, please post to oss-security instead."

Even though formally it was not my responsibility to bring the issue to
oss-security, I apologize to the oss-security community for the two day
delay in doing so.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.