Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20150903213501.F09D236BD1B8@rock.dv.isc.org>
Date: Fri, 04 Sep 2015 07:35:01 +1000
From: Mark Andrews <marka@....org>
To: Florian Weimer <fweimer@...hat.com>
Cc: oss-security@...ts.openwall.com,
    ISC Security Officer <security-officer@....org>
Subject: Re: Two new vulnerabilities in BIND: CVE-2015-5722 and CVE-2015-5986 are now public


In message <55E8995A.9040901@...hat.com>, Florian Weimer writes:
> On 09/02/2015 10:52 PM, ISC Security Officer wrote:
> > Please be advised that ISC publicly announced two critical
> > vulnerabilities in BIND:
> > 
> > + CVE-2015-5722 is a denial-of-service vector which can be
> >   exploited remotely against a BIND server that is performing
> >   validation on DNSSEC-signed records. All versions of BIND since
> >   9.0.0 are vulnerable.
> >   https://kb.isc.org/article/AA-01287
> 
> Your patch had quite good obfuscation, and it took me a while to see
> where the actual fix was.  Was this deliberate?

No, just cleaning up failures to use the api designed to stop the
bug in the first place by keeping the two values in consistent.
 
> But anyway, we can confirm it's exploitable over the network.  Nice
> analysis, I would not have immediately seen that if I only had Hanno's
> reproducer.
> 
> For validating recursors, it's actually quite a bit worse than
> CVE-2015-5477 because CVE-2015-5722 does not require a completely
> crafted query, just an attacker-controlled QNAME (which can be in the
> in-addr.arpa or ip6.arpa tree) is sufficient.  So attacks could be
> reflected through basically anything.
> 
> > + CVE-2015-5986 is a denial-of-service vector which can be used
> >   against a BIND server that is performing recursion and (under
> >   limited conditions) an authoritative-only nameserver.
> >   Versions of BIND since 9.9.7 and 9.10.2 are vulnerable.
> >   https://kb.isc.org/article/AA-01291
> 
> This can't be reflected as easily, only through applications that use
> the affected record type.
> 
> -- 
> Florian Weimer / Red Hat Product Security
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@....org

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.