Bug 1315680 (CVE-2016-1286)

Summary: CVE-2016-1286 bind: malformed signature records for DNAME records can trigger assertion failure
Product: [Other] Security Response Reporter: Martin Prpič <mprpic>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: anemec, bohumil.kriz, carnil, gagriogi, jwright, moshiro, security-response-team, sia, slawomir, thozza, yozone
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: bind 9.9.8-P4, bind 9.10.3-P4, bind 9.9.8-S6 Doc Type: Bug Fix
Doc Text:
A denial of service flaw was found in the way BIND parsed signature records for DNAME records. By sending a specially crafted query, a remote attacker could use this flaw to cause named to crash.
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-04-06 12:03:46 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1315717, 1315718, 1315719, 1315720, 1315721, 1315722, 1316445, 1316446, 1318949, 1318950, 1318951, 1322285    
Bug Blocks: 1315695, 1320435, 1322722    

Description Martin Prpič 2016-03-08 12:17:16 UTC
The following flaw, reported by ISC, was found in BIND:

An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c.

An attacker able to cause a server to make a query deliberately chosen to generate a response containing a signature record which would exercise this vulnerability can cause named to stop execution with an assertion failure, resulting in denial of service to clients. Recursive resolvers are at the highest risk of vulnerability to this attack but authoritative-only servers may be also be vulnerable if the attacker can control the answers for records requested when the authoritative server is performing service on zones (e.g. a slave server doing SOA queries.) Servers may be affected even if they are not performing validation or have DNSSEC disabled entirely as long as they receive a response containing offending signature records. Disabling DNSSEC does not provide protection against this vulnerability.

External References:

https://kb.isc.org/article/AA-01353

Comment 1 Martin Prpič 2016-03-08 12:17:20 UTC
Acknowledgments:

Name: ISC

Comment 5 Huzaifa S. Sidhpurwala 2016-03-10 09:11:27 UTC
Public via:

https://kb.isc.org/article/AA-01353

Comment 6 Huzaifa S. Sidhpurwala 2016-03-10 09:36:04 UTC
Created bind tracking bugs for this issue:

Affects: fedora-all [bug 1316445]

Comment 7 Huzaifa S. Sidhpurwala 2016-03-10 09:36:10 UTC
Created bind99 tracking bugs for this issue:

Affects: fedora-all [bug 1316446]

Comment 9 errata-xmlrpc 2016-03-16 12:54:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5

Via RHSA-2016:0458 https://rhn.redhat.com/errata/RHSA-2016-0458.html

Comment 10 errata-xmlrpc 2016-03-16 13:35:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 5

Via RHSA-2016:0459 https://rhn.redhat.com/errata/RHSA-2016-0459.html

Comment 13 errata-xmlrpc 2016-03-31 17:57:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.6 Extended Update Support
  Red Hat Enterprise Linux 6.5 Advanced Update Support
  Red Hat Enterprise Linux 6.4 Advanced Update Support

Via RHSA-2016:0562 https://rhn.redhat.com/errata/RHSA-2016-0562.html

Comment 14 Tomáš Hozza 2016-04-01 14:55:00 UTC
*** Bug 1318738 has been marked as a duplicate of this bug. ***

Comment 15 errata-xmlrpc 2016-04-06 11:17:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.2 Advanced Update Support

Via RHSA-2016:0601 https://rhn.redhat.com/errata/RHSA-2016-0601.html